Analysis

  • max time kernel
    48s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2022, 21:27

General

  • Target

    installation.bat

  • Size

    427B

  • MD5

    7679ad294e3b294ebfb6a2193370f268

  • SHA1

    7a21710124758000145899c38ef4864541bda176

  • SHA256

    fddc13cd1e11c17eec42a4c9fee527220ecd0ce3875031359ce07dda8bb44127

  • SHA512

    e112c044b90682151606bf7fc47ca886ffd2f63413744a3baf10357ac846a91626fd997040d63a73d14f92f4e40c4709458dff0919db21683bcc1976a833fcb0

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\installation.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Users\Admin\AppData\Local\Temp\dependencies\uninstall.exe
      dependencies/uninstall.exe
      2⤵
      • Suspicious behavior: CmdExeWriteProcessMemorySpam
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Windows\SysWOW64\MSIEXEC.EXE
        MSIEXEC.EXE /i "C:\Users\Admin\AppData\Local\Downloaded Installations\{91648971-5F6B-43AE-9872-0603D92020BE}\abbulkmailer_setup.msi" SETUPEXEDIR="C:\Users\Admin\AppData\Local\Temp\dependencies" SETUPEXENAME="uninstall.exe"
        3⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:1896
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      Powershell.exe -windowstyle hidden -NoP -executionpolicy bypass -File "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\driver.ps1"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1168
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:680

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Downloaded Installations\{91648971-5F6B-43AE-9872-0603D92020BE}\abbulkmailer_setup.msi

    Filesize

    6.2MB

    MD5

    b0f1febb6745c875d2941336144fa2ed

    SHA1

    6cb858ca0022bad99189281c7d9c819d79d9a652

    SHA256

    a226b31420c4205e1cbb0d814cb9ba75461e31d19e9c0c9a834e88eb9dfc86ea

    SHA512

    52b32f39d50ae2836e62f62cb9af3372c1e2f609bcadcdfe9ffcd680c14dc41a2ced763e55678df59fafa58cf37c7286ba71c5ae13a0edfa677659ba2a9c78b5

  • memory/1168-57-0x000007FEFBD91000-0x000007FEFBD93000-memory.dmp

    Filesize

    8KB

  • memory/1168-58-0x000007FEF41A0000-0x000007FEF4BC3000-memory.dmp

    Filesize

    10.1MB

  • memory/1168-59-0x0000000002654000-0x0000000002657000-memory.dmp

    Filesize

    12KB

  • memory/1168-60-0x000007FEF3640000-0x000007FEF419D000-memory.dmp

    Filesize

    11.4MB

  • memory/1168-61-0x0000000002654000-0x0000000002657000-memory.dmp

    Filesize

    12KB

  • memory/1932-55-0x0000000075091000-0x0000000075093000-memory.dmp

    Filesize

    8KB