Analysis

  • max time kernel
    151s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    25-10-2021 08:18

General

  • Target

    Bat-To-Exe-Converter-Downloader-master/Windows/downloader-x64.exe

  • Size

    144KB

  • MD5

    3fb68cba82af1b38920517e571f63615

  • SHA1

    2abc67be4363069e8aeab8f48be983c13254585e

  • SHA256

    a70d406ec7e67dbd65f97c6b109583071e09b81f1ef9ef97e2a1c21a00801207

  • SHA512

    b0d884439ff916297ccbbeb7ddf892fbbe242e853193bd7f857988d8e5ae6dc0156ffe6a8771ac0b90e40c9403191ca5f8179802a4104dfc2635ebd58ebef4cb

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Bat-To-Exe-Converter-Downloader-master\Windows\downloader-x64.exe
    "C:\Users\Admin\AppData\Local\Temp\Bat-To-Exe-Converter-Downloader-master\Windows\downloader-x64.exe"
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1328

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1328-54-0x000007FEFC461000-0x000007FEFC463000-memory.dmp
    Filesize

    8KB

  • memory/1328-55-0x0000000004A00000-0x0000000004A01000-memory.dmp
    Filesize

    4KB