Analysis

  • max time kernel
    41s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-05-2022 05:16

General

  • Target

    SALIKHACK/SALIKHACK.bat

  • Size

    238B

  • MD5

    21a67af3a0e70534daf91c971545bc80

  • SHA1

    23141575d04651a2cd778a33732805c468033ef0

  • SHA256

    940dd6c2693be78a671cad250f75a5b5324b3350e2b2fc1cfc098293b934fdb3

  • SHA512

    b79f1dd26beee4a6995b0d67f112e4dff152d05822e8482579b6bdbd414b06cfbdeb6f55f4cb41d1821e6e7b98bfa3852e1d163355b3de5cd985373f8a333e66

Score
1/10

Malware Config

Signatures

  • Runs net.exe
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\SALIKHACK\SALIKHACK.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Windows\system32\reg.exe
      reg add "HKCU\Software\Microsoft\Windows\DWM" /v Composition /t reg_dword /d 00000001 /f
      2⤵
        PID:1652
      • C:\Windows\system32\reg.exe
        reg add "HKCU\Software\Microsoft\Windows\DWM" /v CompositionPolicy /t reg_dword /d 00000002 /f
        2⤵
          PID:1476
        • C:\Windows\system32\net.exe
          net stop uxsms
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1508
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop uxsms
            3⤵
              PID:1448
          • C:\Windows\system32\net.exe
            net start uxsms
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1816
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 start uxsms
              3⤵
                PID:1468
          • C:\Windows\system32\Dwm.exe
            "C:\Windows\system32\Dwm.exe"
            1⤵
              PID:940

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1448-57-0x0000000000000000-mapping.dmp
            • memory/1468-59-0x0000000000000000-mapping.dmp
            • memory/1476-55-0x0000000000000000-mapping.dmp
            • memory/1508-56-0x0000000000000000-mapping.dmp
            • memory/1652-54-0x0000000000000000-mapping.dmp
            • memory/1816-58-0x0000000000000000-mapping.dmp