Analysis

  • max time kernel
    300s
  • max time network
    300s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    22-10-2021 07:38

General

  • Target

    OBF15x-1488.bat

  • Size

    12KB

  • MD5

    eacfa5cc7fc9d81a7f9fc51b54e5e9c5

  • SHA1

    2bd45785d9aed1fc61077a9f2a6d971840de8b0e

  • SHA256

    bfdbc187e2f5d6f0c06d7d96c29a8bec1d8e782f4fcb13466f3b10c9e7498b83

  • SHA512

    06dba01c4c68e2d3b46b1d60693ec2c3a887cc3648be65f2600e7addf58f2a1071a874a187bf83bb54f23655384c6982524e2a54597d35ef18219aa36c66f885

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 64 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\OBF15x-1488.bat"
    1⤵
    • Drops file in Drivers directory
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:752
    • C:\Windows\system32\takeown.exe
      takeown /f C:\Windows\System32
      2⤵
      • Modifies file permissions
      • Suspicious use of AdjustPrivilegeToken
      PID:652
    • C:\Windows\system32\shutdown.exe
      shutdown shutdown -r -t 0
      2⤵
        PID:984

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    File Permissions Modification

    1
    T1222

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/652-55-0x0000000000000000-mapping.dmp
    • memory/984-56-0x0000000000000000-mapping.dmp