Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2023, 21:29
Static task
static1
Behavioral task
behavioral1
Sample
[n.bat
Resource
win7-20230831-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
[n.bat
Resource
win10v2004-20230915-en
4 signatures
150 seconds
General
-
Target
[n.bat
-
Size
76KB
-
MD5
add59634df83e04f62b30ff85504e5d2
-
SHA1
678eec7628d390525e5174af0719c5f85b0e81cd
-
SHA256
051863d82a2fb8f8b61fafa363a6f6617b48f95448d836d681105144cdcbcccf
-
SHA512
dfa8d38e69bfdf17f154bc09e6203233a06c00e9880cbd3b5bfb7cd8d3f1b17e3c8b4f4303e29d7a0559798e3d4bfc3dc1937456ec428a8249a815b2e42d6048
-
SSDEEP
384:SmB+m9dm9hm9rm99m93ml5mlomlumlSmlcmlsmlkmllmlZmjDmlfmn7mlJmlTmlq:3jcIm8KcBn7Vl9oemQes2kL
Score
1/10
Malware Config
Signatures
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4604 ipconfig.exe -
Kills process with taskkill 1 IoCs
pid Process 1148 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1148 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2332 wrote to memory of 4348 2332 cmd.exe 87 PID 2332 wrote to memory of 4348 2332 cmd.exe 87 PID 2332 wrote to memory of 1148 2332 cmd.exe 88 PID 2332 wrote to memory of 1148 2332 cmd.exe 88 PID 2332 wrote to memory of 4604 2332 cmd.exe 91 PID 2332 wrote to memory of 4604 2332 cmd.exe 91 PID 2332 wrote to memory of 2224 2332 cmd.exe 92 PID 2332 wrote to memory of 2224 2332 cmd.exe 92
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\[n.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\system32\mode.commode con cols=107 lines=412⤵PID:4348
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
C:\Windows\system32\ipconfig.exeipconfig2⤵
- Gathers network information
PID:4604
-
-
C:\Windows\system32\findstr.exefindstr IPv42⤵PID:2224
-