Resubmissions
07/02/2023, 18:14
230207-wvj6wada98 1Analysis
-
max time kernel
82s -
max time network
86s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2023, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
install.bat
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
install.bat
Resource
win10v2004-20221111-en
General
-
Target
install.bat
-
Size
4KB
-
MD5
1e2f0cee168e9efbf71954a91c155356
-
SHA1
1da5b5d28d83b51ee58895b48488a22d1dc49897
-
SHA256
4cd8cc1a84521644561b76338aabcf7c1d7681564b0415b0a548b6a8e9700a73
-
SHA512
593cbc366c79e7f2b0dda7260363305e9cd112f665a7375998b34f9a8792f9fb2313e36b17b587010f7d29b24221da756dee1a84f65628e69037a40952d52c64
-
SSDEEP
96:qGQ9HHSDNcCMOQMYAMlVu7YOnMkycpy1Xq0RHqs0V:qGQ9nRY3YHXuMOMkycpy1XBqs0V
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2436 powershell.exe 2436 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2436 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 4496 2072 cmd.exe 83 PID 2072 wrote to memory of 4496 2072 cmd.exe 83 PID 2072 wrote to memory of 2436 2072 cmd.exe 84 PID 2072 wrote to memory of 2436 2072 cmd.exe 84
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\install.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\system32\findstr.exefindstr /v "^;;;===,,," "C:\Users\Admin\AppData\Local\Temp\install.bat"2⤵PID:4496
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe -ExecutionPolicy Bypass -Command "& 'C:\Users\Admin\AppData\Local\Temp\ps.ps1'"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4028
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD54d70184c5dadd0bb980a13aedab4988b
SHA1a8e17c70cba0911ca56b8f75f568082eb2849f9b
SHA256259ec34b25f4aa29f33322702b3d3a678b7f1109f03ba3b04e973d0c3092a49a
SHA5124475a858928fecbce18dbeb5463222020ab0848109e29afad9e0c72beb41941a9b60f1d8fdda073cd945846e0530ee9006c927bcd7af1e9d96828f18887f315f