Analysis

  • max time kernel
    43s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 23:16

General

  • Target

    matrix.bat

  • Size

    3KB

  • MD5

    46b9b47f557d873e587b18ebca4ff39f

  • SHA1

    e26e3654987feff54a2ed9525862715f2bf5a068

  • SHA256

    d084bcd4d01dc5964e31910bc90ca4574d6270e1e57f01af7c633ee02e0a6d06

  • SHA512

    035f4acac4374fa2e0fdc61c00eacc52a0b520fbb1acfef76c8fae776b1cfaf8a3d2e0c7cc971de5245c16f57a1cd12121252ed557a298bb3b4fe8a90f257510

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\matrix.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:736
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K copy /y /b C:\Windows\System32\rundll32.exe C:\ProgramData\oiv0I4ymqE.exe
      2⤵
        PID:1880
      • C:\Windows\system32\xcopy.exe
        xcopy /h /y worldsex.dll C:\ProgramData
        2⤵
          PID:1152

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/736-56-0x000007FEFB991000-0x000007FEFB993000-memory.dmp

        Filesize

        8KB