Analysis
-
max time kernel
29s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-es -
resource tags
arch:x64arch:x86image:win7-20221111-eslocale:es-esos:windows7-x64systemwindows -
submitted
04/01/2023, 23:04
Static task
static1
Behavioral task
behavioral1
Sample
install.bat
Resource
win7-20221111-es
Behavioral task
behavioral2
Sample
install.bat
Resource
win10v2004-20220812-es
General
-
Target
install.bat
-
Size
4KB
-
MD5
1e2f0cee168e9efbf71954a91c155356
-
SHA1
1da5b5d28d83b51ee58895b48488a22d1dc49897
-
SHA256
4cd8cc1a84521644561b76338aabcf7c1d7681564b0415b0a548b6a8e9700a73
-
SHA512
593cbc366c79e7f2b0dda7260363305e9cd112f665a7375998b34f9a8792f9fb2313e36b17b587010f7d29b24221da756dee1a84f65628e69037a40952d52c64
-
SSDEEP
96:qGQ9HHSDNcCMOQMYAMlVu7YOnMkycpy1Xq0RHqs0V:qGQ9nRY3YHXuMOMkycpy1XBqs0V
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1088 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1088 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1124 wrote to memory of 508 1124 cmd.exe 29 PID 1124 wrote to memory of 508 1124 cmd.exe 29 PID 1124 wrote to memory of 508 1124 cmd.exe 29 PID 1124 wrote to memory of 1088 1124 cmd.exe 30 PID 1124 wrote to memory of 1088 1124 cmd.exe 30 PID 1124 wrote to memory of 1088 1124 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\install.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\system32\findstr.exefindstr /v "^;;;===,,," "C:\Users\Admin\AppData\Local\Temp\install.bat"2⤵PID:508
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe -ExecutionPolicy Bypass -Command "& 'C:\Users\Admin\AppData\Local\Temp\ps.ps1'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD54d70184c5dadd0bb980a13aedab4988b
SHA1a8e17c70cba0911ca56b8f75f568082eb2849f9b
SHA256259ec34b25f4aa29f33322702b3d3a678b7f1109f03ba3b04e973d0c3092a49a
SHA5124475a858928fecbce18dbeb5463222020ab0848109e29afad9e0c72beb41941a9b60f1d8fdda073cd945846e0530ee9006c927bcd7af1e9d96828f18887f315f