Analysis

  • max time kernel
    141s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/09/2023, 21:29

General

  • Target

    [n.bat

  • Size

    76KB

  • MD5

    add59634df83e04f62b30ff85504e5d2

  • SHA1

    678eec7628d390525e5174af0719c5f85b0e81cd

  • SHA256

    051863d82a2fb8f8b61fafa363a6f6617b48f95448d836d681105144cdcbcccf

  • SHA512

    dfa8d38e69bfdf17f154bc09e6203233a06c00e9880cbd3b5bfb7cd8d3f1b17e3c8b4f4303e29d7a0559798e3d4bfc3dc1937456ec428a8249a815b2e42d6048

  • SSDEEP

    384:SmB+m9dm9hm9rm99m93ml5mlomlumlSmlcmlsmlkmllmlZmjDmlfmn7mlJmlTmlq:3jcIm8KcBn7Vl9oemQes2kL

Score
1/10

Malware Config

Signatures

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\[n.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2332
    • C:\Windows\system32\mode.com
      mode con cols=107 lines=41
      2⤵
        PID:4348
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im explorer.exe
        2⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1148
      • C:\Windows\system32\ipconfig.exe
        ipconfig
        2⤵
        • Gathers network information
        PID:4604
      • C:\Windows\system32\findstr.exe
        findstr IPv4
        2⤵
          PID:2224

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads