Analysis

  • max time kernel
    62s
  • max time network
    49s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    08-07-2020 18:30

General

  • Target

    TvwMA57y.bat

  • Size

    13KB

  • MD5

    44fbd58c401a7786da2e8b6a6291379e

  • SHA1

    9dbfd08fa557d9dce79911eb4bbddb2008d4f53f

  • SHA256

    d8b47727ea05305ad396977b336c3bfc86ae122cdde01976fa9b0c3a7c2d3f24

  • SHA512

    c369f749ba3ef4e463524b3483c4250311c2a19414a49dc86c052cac9c9d0a3b05dbdbf71b854ccf6f46abc46e439f9264c7672e22a0c3004b7d679e26a56de3

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 7 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 20524 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 32 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 31 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\TvwMA57y.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Windows\system32\cscript.exe
      cscript x.js
      2⤵
        PID:996
      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        "C:\Users\Admin\AppData\Roaming\MEMZ.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:940
        • C:\Users\Admin\AppData\Roaming\MEMZ.exe
          "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:2600
        • C:\Users\Admin\AppData\Roaming\MEMZ.exe
          "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:2764
        • C:\Users\Admin\AppData\Roaming\MEMZ.exe
          "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:2892
        • C:\Users\Admin\AppData\Roaming\MEMZ.exe
          "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:3712
        • C:\Users\Admin\AppData\Roaming\MEMZ.exe
          "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          PID:3016
        • C:\Users\Admin\AppData\Roaming\MEMZ.exe
          "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /main
          3⤵
          • Executes dropped EXE
          • Writes to the Master Boot Record (MBR)
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3976
          • C:\Windows\SysWOW64\notepad.exe
            "C:\Windows\System32\notepad.exe" \note.txt
            4⤵
              PID:1736
            • C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe
              "C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"
              4⤵
              • Suspicious use of SetWindowsHookEx
              PID:724
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Checks SCSI registry key(s)
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:60

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Bootkit

      1
      T1067

      Discovery

      Query Registry

      1
      T1012

      Peripheral Device Discovery

      1
      T1120

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\x
        MD5

        1882f3dd051e401349f1af58d55b0a37

        SHA1

        6b0875f9e3164f3a9f21c1ec36748a7243515b47

        SHA256

        3c8cea1a86f07b018e637a1ea2649d907573f78c7e4025ef7e514362d09ff6c0

        SHA512

        fec96d873997b5c6c82a94f8796c88fc2dd38739277c517b8129277dcbda02576851f1e27bdb2fbb7255281077d5b9ba867f6dfe66bedfc859c59fdd3bbffacf

      • C:\Users\Admin\AppData\Local\Temp\x.js
        MD5

        8eec8704d2a7bc80b95b7460c06f4854

        SHA1

        1b34585c1fa7ec0bd0505478ac9dbb8b8d19f326

        SHA256

        aa01b8864b43e92077a106ed3d4656a511f3ba1910fba40c78a32ee6a621d596

        SHA512

        e274b92810e9a30627a65f87448d784967a2fcfbf49858cbe6ccb841f09e0f53fde253ecc1ea0c7de491d8cc56a6cf8c79d1b7c657e72928cfb0479d11035210

      • C:\Users\Admin\AppData\Local\Temp\z.zip
        MD5

        63ee4412b95d7ad64c54b4ba673470a7

        SHA1

        1cf423c6c2c6299e68e1927305a3057af9b3ce06

        SHA256

        44c1857b1c4894b3dfbaccbe04905652e634283dcf6b06c25a74b17021e2a268

        SHA512

        7ff153826bd5fed0a410f6d15a54787b79eba927d5b573c8a7f23f4ecef7bb223d79fd29fe8c2754fbf5b4c77ab7c41598f2989b6f4c7b2aa2f579ef4af06ee7

      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
        MD5

        19dbec50735b5f2a72d4199c4e184960

        SHA1

        6fed7732f7cb6f59743795b2ab154a3676f4c822

        SHA256

        a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d

        SHA512

        aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d

      • C:\note.txt
        MD5

        afa6955439b8d516721231029fb9ca1b

        SHA1

        087a043cc123c0c0df2ffadcf8e71e3ac86bbae9

        SHA256

        8e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270

        SHA512

        5da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf

      • memory/724-23-0x0000000000000000-mapping.dmp
      • memory/940-6-0x0000000000000000-mapping.dmp
      • memory/940-5-0x0000000000000000-mapping.dmp
      • memory/996-2-0x0000021F62350000-0x0000021F62354000-memory.dmp
        Filesize

        16KB

      • memory/996-0-0x0000000000000000-mapping.dmp
      • memory/1736-21-0x0000000000000000-mapping.dmp
      • memory/2600-9-0x0000000000000000-mapping.dmp
      • memory/2764-11-0x0000000000000000-mapping.dmp
      • memory/2892-13-0x0000000000000000-mapping.dmp
      • memory/3016-17-0x0000000000000000-mapping.dmp
      • memory/3712-15-0x0000000000000000-mapping.dmp
      • memory/3976-19-0x0000000000000000-mapping.dmp