Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2023 17:32

General

  • Target

    data/plugins/tpm_on.bat

  • Size

    281B

  • MD5

    01548ec95cdac921856a9329a929ba02

  • SHA1

    110041308436e5a366016b0f291404ff386b73b7

  • SHA256

    f069b3952d0ffa55d88938c0be880d843fbb8a807a585408854631fddd6c0e10

  • SHA512

    4adc68b4f05b0b665d197093b5682fa817dc1fc15481efd6a62c2b023160de638f8b6be1f8e32a2cc8b9a8b7949e765d0c6a3dc9a832b4be99d5c041e34f50a0

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\data\plugins\tpm_on.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Windows\system32\reg.exe
      REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\Setup\LabConfig" /V BypassTPMCheck /T REG_DWORD /D 1 /F
      2⤵
        PID:4244
      • C:\Windows\system32\reg.exe
        REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\Setup\LabConfig" /V BypassRAMCheck /T REG_DWORD /D 1 /F
        2⤵
          PID:4712
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\Setup\LabConfig" /V BypassSecureBootCheck /T REG_DWORD /D 1 /F
          2⤵
            PID:1340

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1340-134-0x0000000000000000-mapping.dmp

        • memory/4244-132-0x0000000000000000-mapping.dmp

        • memory/4712-133-0x0000000000000000-mapping.dmp