Analysis
-
max time kernel
90s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2023, 12:34
Static task
static1
Behavioral task
behavioral1
Sample
DTC.jar
Resource
win7-20230220-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
DTC.jar
Resource
win10v2004-20230220-en
9 signatures
150 seconds
Behavioral task
behavioral3
Sample
start.bat
Resource
win7-20230220-en
2 signatures
150 seconds
Behavioral task
behavioral4
Sample
start.bat
Resource
win10v2004-20230220-en
2 signatures
150 seconds
General
-
Target
start.bat
-
Size
186B
-
MD5
3fb44e0e200114d237e7292bf587dd37
-
SHA1
5dc71c7364410f9bdae952f0bfee1f9943d03d99
-
SHA256
0c81c35eee248be6b4b522973dbe13e45d81ca10401bfcdec635632259a68c29
-
SHA512
dc1b969437772a7b055ba273501477982e348ada3846f1908d8c7170905a8de12617294d684c54dec6dbdeb43e2384f8019bdd6ba366714b9b6ddca1f8068ca1
Score
1/10
Malware Config
Signatures
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 1672 reg.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2280 wrote to memory of 1672 2280 cmd.exe 84 PID 2280 wrote to memory of 1672 2280 cmd.exe 84 PID 2280 wrote to memory of 2044 2280 cmd.exe 85 PID 2280 wrote to memory of 2044 2280 cmd.exe 85
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\start.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\system32\reg.exeREG ADD HKCU\CONSOLE /f /v VirtualTerminalLevel /t REG_DWORD /d 12⤵
- Modifies registry key
PID:1672
-
-
C:\ProgramData\Oracle\Java\javapath\java.exejava -jar "C:\Users\Admin\AppData\Local\Temp\DTC.jar" -start2⤵PID:2044
-