Analysis

  • max time kernel
    21s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    28-07-2021 03:32

General

  • Target

    1.bat

  • Size

    4KB

  • MD5

    22eacca2035b4f78dbd5c591d4555343

  • SHA1

    adb82749c10765524011b4ed30388d86e252ed69

  • SHA256

    54cdce4be37c4ce2ef3f5a3adfcfdf22f002f345500db57098bd29a49d7b60a9

  • SHA512

    55e97b4b59df77de865b9880776fbe75fbc25d7b211d4ed64fcb9c02ae9fa7c5bea00350a7396bcef46b8d7ce5e0f0c0e99e7b8f42f4513ffe448a90966303c4

Score
10/10

Malware Config

Signatures

  • suricata: ET MALWARE Suspected Bizarro Banker Activity (POST)
  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\1.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c chcp
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1828
      • C:\Windows\system32\chcp.com
        chcp
        3⤵
          PID:2148
      • C:\Windows\system32\chcp.com
        chcp 708
        2⤵
          PID:2768
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\1.bat" "
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:748
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo %bv4jve9jmIJbsBKNh% "
            3⤵
              PID:3940
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell.exe -ep bypass -nop -win 1 -
              3⤵
              • Blocklisted process makes network request
              • Adds Run key to start application
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:3140
              • C:\Users\Public\nUutVvkD\fMjOp.exe
                "C:\Users\Public\nUutVvkD\fMjOp.exe" BrfjYAem pAdbetH
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Modifies Internet Explorer settings
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:3104
          • C:\Windows\system32\chcp.com
            chcp 437
            2⤵
              PID:1504

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Registry Run Keys / Startup Folder

          1
          T1060

          Defense Evasion

          Modify Registry

          2
          T1112

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Public\nUutVvkD\BrfjYAem
            MD5

            305267684e1173cf3dc972eb8f091da5

            SHA1

            a9e415f2d21348c9cd84281f9379ea4c16754d7b

            SHA256

            221c7b66f5e3ddb0dce391bbe1b3aa610c568ee4a0599a5da8ba1ba557ca9bb0

            SHA512

            8f85d2782a3c63b06713f5a87308ee0db3a855da45d7426bfebaca4aedb1f3d78ae3710a43695c4c25051a834a7c8af931622ee94fa2af28c3f3888e728cd23d

          • C:\Users\Public\nUutVvkD\fMjOp.exe
            MD5

            01f601da6304451e0bc17cf004c97c43

            SHA1

            1aa363861d1cfc45056068de0710289ebbfcb886

            SHA256

            945adada6cf6698b949359d9b395a5f905989d0d1eb84f537de492ecc1263148

            SHA512

            cc74c0b016ab1f53069f6ffbe1e35373090a64ad5630cefbb70e72febdd00fb2d885838e5b9836382bf4b160998a08d7ce149071c73b10aa4320bca00805cb6b

          • C:\Users\Public\nUutVvkD\fMjOp.exe
            MD5

            01f601da6304451e0bc17cf004c97c43

            SHA1

            1aa363861d1cfc45056068de0710289ebbfcb886

            SHA256

            945adada6cf6698b949359d9b395a5f905989d0d1eb84f537de492ecc1263148

            SHA512

            cc74c0b016ab1f53069f6ffbe1e35373090a64ad5630cefbb70e72febdd00fb2d885838e5b9836382bf4b160998a08d7ce149071c73b10aa4320bca00805cb6b

          • C:\Users\Public\nUutVvkD\pAdbetH.DLL
            MD5

            accaacf8539040c927f65dabb0dce397

            SHA1

            b9020895d761fa03c25739302cec95fd80740abc

            SHA256

            445a563899aed8b661ba2362bed89f4c92bcc8e22de32922217a39139f681cc6

            SHA512

            4ac02d0e2724b1fe1c23a3780e210410205dac56a100f12bab19b8b87504eb22e79ccf732ed5acb2323d1627fd29d27dfd9932b99827a1e417ee770795bb0999

          • \Users\Public\nUutVvkD\pAdbetH.dll
            MD5

            accaacf8539040c927f65dabb0dce397

            SHA1

            b9020895d761fa03c25739302cec95fd80740abc

            SHA256

            445a563899aed8b661ba2362bed89f4c92bcc8e22de32922217a39139f681cc6

            SHA512

            4ac02d0e2724b1fe1c23a3780e210410205dac56a100f12bab19b8b87504eb22e79ccf732ed5acb2323d1627fd29d27dfd9932b99827a1e417ee770795bb0999

          • \Users\Public\nUutVvkD\pAdbetH.dll
            MD5

            accaacf8539040c927f65dabb0dce397

            SHA1

            b9020895d761fa03c25739302cec95fd80740abc

            SHA256

            445a563899aed8b661ba2362bed89f4c92bcc8e22de32922217a39139f681cc6

            SHA512

            4ac02d0e2724b1fe1c23a3780e210410205dac56a100f12bab19b8b87504eb22e79ccf732ed5acb2323d1627fd29d27dfd9932b99827a1e417ee770795bb0999

          • memory/748-117-0x0000000000000000-mapping.dmp
          • memory/1504-223-0x0000000000000000-mapping.dmp
          • memory/1828-114-0x0000000000000000-mapping.dmp
          • memory/2148-115-0x0000000000000000-mapping.dmp
          • memory/2768-116-0x0000000000000000-mapping.dmp
          • memory/3104-230-0x00000000018A0000-0x00000000018A1000-memory.dmp
            Filesize

            4KB

          • memory/3104-233-0x0000000003110000-0x0000000003111000-memory.dmp
            Filesize

            4KB

          • memory/3104-235-0x0000000003120000-0x0000000003121000-memory.dmp
            Filesize

            4KB

          • memory/3104-234-0x0000000004A70000-0x0000000005770000-memory.dmp
            Filesize

            13.0MB

          • memory/3104-212-0x0000000000000000-mapping.dmp
          • memory/3104-232-0x00000000018C0000-0x00000000018C1000-memory.dmp
            Filesize

            4KB

          • memory/3104-231-0x00000000018B0000-0x00000000018B1000-memory.dmp
            Filesize

            4KB

          • memory/3104-228-0x0000000001880000-0x0000000001881000-memory.dmp
            Filesize

            4KB

          • memory/3104-229-0x0000000001890000-0x0000000001891000-memory.dmp
            Filesize

            4KB

          • memory/3140-126-0x000002843C3E0000-0x000002843C3E1000-memory.dmp
            Filesize

            4KB

          • memory/3140-119-0x0000000000000000-mapping.dmp
          • memory/3140-132-0x0000028422293000-0x0000028422295000-memory.dmp
            Filesize

            8KB

          • memory/3140-131-0x0000028422290000-0x0000028422292000-memory.dmp
            Filesize

            8KB

          • memory/3140-145-0x000002843C8C0000-0x000002843C8C1000-memory.dmp
            Filesize

            4KB

          • memory/3140-156-0x000002843CAE0000-0x000002843CAE1000-memory.dmp
            Filesize

            4KB

          • memory/3140-166-0x0000028422296000-0x0000028422298000-memory.dmp
            Filesize

            8KB

          • memory/3940-118-0x0000000000000000-mapping.dmp