Analysis

  • max time kernel
    417s
  • max time network
    422s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2022 18:04

General

  • Target

    file.bat

  • Size

    121B

  • MD5

    f2dfe2d042da18133306eed955367273

  • SHA1

    430ea7ed2c8fdfcd86d908c349e69e135b08cff8

  • SHA256

    c7509974ecff20140e027d4212c996dc32ecbec7f13c03ff85f82286df6a01e7

  • SHA512

    4df232226b4f5498ab17a1b9761ebba375975bc9cabe41636e99e1ec738379e64524197c90ba167ef3473ed42890e302e2a2e3dabfc6be595a814d2c64bb1426

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 5 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 6 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\file.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Windows\system32\forfiles.exe
      forfiles /S /M *.msi /C "cmd rundll32 shell32.dll,ShellExec_RunDLL cmd.exe /c msiexec /quiet /a @path"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1148
      • C:\Windows\system32\cmd.exe
        rundll32 shell32.dll,ShellExec_RunDLL cmd.exe /c msiexec /quiet /a "C:\Users\Admin\AppData\Local\Temp\uu.msi"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1304
        • C:\Windows\system32\msiexec.exe
          msiexec /quiet /a "C:\Users\Admin\AppData\Local\Temp\uu.msi"
          4⤵
          • Suspicious behavior: CmdExeWriteProcessMemorySpam
          • Suspicious use of AdjustPrivilegeToken
          PID:1392
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:828

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1392-57-0x000007FEFBC31000-0x000007FEFBC33000-memory.dmp

    Filesize

    8KB