Overview
overview
10Static
static
1ReklamX.bat
windows7-x64
1ReklamX.bat
windows10-2004-x64
1ReklamX.ps1
windows7-x64
1ReklamX.ps1
windows10-2004-x64
10ReklamX.vbs
windows7-x64
1ReklamX.vbs
windows10-2004-x64
1ini.bat
windows7-x64
1ini.bat
windows10-2004-x64
1ini.ps1
windows7-x64
1ini.ps1
windows10-2004-x64
1ini.vbs
windows7-x64
3ini.vbs
windows10-2004-x64
3Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06-10-2023 14:52
Static task
static1
Behavioral task
behavioral1
Sample
ReklamX.bat
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ReklamX.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
ReklamX.ps1
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
ReklamX.ps1
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
ReklamX.vbs
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
ReklamX.vbs
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
ini.bat
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
ini.bat
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
ini.ps1
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
ini.ps1
Resource
win10v2004-20230915-en
Behavioral task
behavioral11
Sample
ini.vbs
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
ini.vbs
Resource
win10v2004-20230915-en
General
-
Target
ini.ps1
-
Size
747B
-
MD5
71d276530525756ea14087eaec0bc465
-
SHA1
8789d58df8c41d1a42be25e23bc9d73213f909f4
-
SHA256
2a3ef26379e1a38f96157b0b675609f1240302ae709147bea9cbf37a2519c512
-
SHA512
178003d1ce2c9b91c0a33e707161145be71437ef9d31d0befa2ee1e6dca8b3fa6d7c2aebffa266f38dac07f5e25f3c753864ab93b0a60b89440254602199ff96
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1248 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1248 powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\ini.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
C:\Windows\system32\taskeng.exetaskeng.exe {5719B36C-685F-4976-9D2B-CA612A14A391} S-1-5-21-3849525425-30183055-657688904-1000:KGPMNUDG\Admin:Interactive:[1]1⤵PID:2524