Analysis

  • max time kernel
    178s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 05:16

General

  • Target

    SALIKHACK/SALIKHACK.bat

  • Size

    238B

  • MD5

    21a67af3a0e70534daf91c971545bc80

  • SHA1

    23141575d04651a2cd778a33732805c468033ef0

  • SHA256

    940dd6c2693be78a671cad250f75a5b5324b3350e2b2fc1cfc098293b934fdb3

  • SHA512

    b79f1dd26beee4a6995b0d67f112e4dff152d05822e8482579b6bdbd414b06cfbdeb6f55f4cb41d1821e6e7b98bfa3852e1d163355b3de5cd985373f8a333e66

Score
1/10

Malware Config

Signatures

  • Runs net.exe
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\SALIKHACK\SALIKHACK.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Windows\system32\reg.exe
      reg add "HKCU\Software\Microsoft\Windows\DWM" /v Composition /t reg_dword /d 00000001 /f
      2⤵
        PID:2588
      • C:\Windows\system32\reg.exe
        reg add "HKCU\Software\Microsoft\Windows\DWM" /v CompositionPolicy /t reg_dword /d 00000002 /f
        2⤵
          PID:3028
        • C:\Windows\system32\net.exe
          net stop uxsms
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3296
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop uxsms
            3⤵
              PID:2544
          • C:\Windows\system32\net.exe
            net start uxsms
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4392
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 start uxsms
              3⤵
                PID:4024

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2544-133-0x0000000000000000-mapping.dmp
          • memory/2588-130-0x0000000000000000-mapping.dmp
          • memory/3028-131-0x0000000000000000-mapping.dmp
          • memory/3296-132-0x0000000000000000-mapping.dmp
          • memory/4024-135-0x0000000000000000-mapping.dmp
          • memory/4392-134-0x0000000000000000-mapping.dmp