Analysis

  • max time kernel
    40s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    03-04-2023 17:05

General

  • Target

    @bat_crack.exe

  • Size

    29.5MB

  • MD5

    599cf4007855e6441cffb3e575d487ac

  • SHA1

    82aa0d18edd56836b194ad461bf11d6ac4125c28

  • SHA256

    5e1bfe969ed1030a82dd607acfb0aa116d95ee2ff8d160dcd783d0c30e062e09

  • SHA512

    a7fead6768330b2114beab5afc755418419725430a3da17132d7f5e942e0d48c59365b0e69e33e57cf0f9e115f2ec59f934cfe83b99eea79ec8a480d15aa3cc6

  • SSDEEP

    786432:4+xN5xHIskKdcR3aiaBhrh/gn1465WrI9/yR:3xVoadcBaL9c142W89/e

Score
5/10

Malware Config

Signatures

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\@bat_crack.exe
    "C:\Users\Admin\AppData\Local\Temp\@bat_crack.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2044

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2044-54-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2044-55-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2044-56-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2044-57-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2044-58-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2044-59-0x0000000000250000-0x0000000000251000-memory.dmp

    Filesize

    4KB

  • memory/2044-60-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2044-61-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2044-62-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2044-63-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2044-64-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2044-65-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2044-67-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2044-68-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2044-70-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/2044-71-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/2044-73-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/2044-74-0x0000000000320000-0x0000000000321000-memory.dmp

    Filesize

    4KB

  • memory/2044-76-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/2044-77-0x0000000000330000-0x0000000000331000-memory.dmp

    Filesize

    4KB

  • memory/2044-78-0x0000000000400000-0x000000000575E000-memory.dmp

    Filesize

    83.4MB