Resubmissions

29/05/2023, 21:43

230529-1kzk2aea7x 6

29/05/2023, 21:40

230529-1h82paea7s 1

Analysis

  • max time kernel
    1791s
  • max time network
    1594s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2023, 21:43

General

  • Target

    SDIO_auto.bat

  • Size

    845B

  • MD5

    6b212b7437621b9da03bc0cc0652e799

  • SHA1

    6f47859d1ecd805b94bcf7f9f4f741827494f0e6

  • SHA256

    4db7e2a32b85f2a21ce95778b627d1454f6875ae3bf8aab90b917fab362d15d4

  • SHA512

    3adea96c7e6e40ec4a9519b536d9d4c91d9638e9f2438e9bb4e36ea6ff7fb7fb2c91bca57c6f3850ad45336782efe910f7a10d1aebbfdc11573a2378574efcd5

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\SDIO_auto.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4700
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c dir /b /od "C:\Users\Admin\AppData\Local\Temp\SDIO_"x64_R"*.exe"
      2⤵
        PID:748
      • C:\Users\Admin\AppData\Local\Temp\SDIO_x64_R753.exe
        "C:\Users\Admin\AppData\Local\Temp\SDIO_x64_R753.exe"
        2⤵
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:1368

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1368-151-0x0000000000400000-0x000000000094C000-memory.dmp

      Filesize

      5.3MB