Analysis

  • max time kernel
    90s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2023, 12:34

General

  • Target

    start.bat

  • Size

    186B

  • MD5

    3fb44e0e200114d237e7292bf587dd37

  • SHA1

    5dc71c7364410f9bdae952f0bfee1f9943d03d99

  • SHA256

    0c81c35eee248be6b4b522973dbe13e45d81ca10401bfcdec635632259a68c29

  • SHA512

    dc1b969437772a7b055ba273501477982e348ada3846f1908d8c7170905a8de12617294d684c54dec6dbdeb43e2384f8019bdd6ba366714b9b6ddca1f8068ca1

Score
1/10

Malware Config

Signatures

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\start.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\system32\reg.exe
      REG ADD HKCU\CONSOLE /f /v VirtualTerminalLevel /t REG_DWORD /d 1
      2⤵
      • Modifies registry key
      PID:1672
    • C:\ProgramData\Oracle\Java\javapath\java.exe
      java -jar "C:\Users\Admin\AppData\Local\Temp\DTC.jar" -start
      2⤵
        PID:2044

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2044-144-0x0000000002A20000-0x0000000002A21000-memory.dmp

      Filesize

      4KB