Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 14:03
Static task
static1
Behavioral task
behavioral1
Sample
encryptedd.bat
Resource
win7-20230831-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
encryptedd.bat
Resource
win10v2004-20230915-en
2 signatures
150 seconds
General
-
Target
encryptedd.bat
-
Size
836B
-
MD5
ca905143560e9100a89d577f0ffb84f4
-
SHA1
278a85b33e5b995620fdf78540a888e493065ca0
-
SHA256
0128273c2f76cd3ba4c8d8104404447b2b4c39103dc8cf76fa4b9a370bf5946e
-
SHA512
dd2555b1029a214991525ede9ddf6c2a596f5527b6f5bb14598b5d80893931e047252bcf9099e67d20abc063be2c9df1747ac26747cd4a1ba39c951b53fb482a
Score
1/10
Malware Config
Signatures
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1904 ipconfig.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2096 wrote to memory of 1904 2096 cmd.exe 29 PID 2096 wrote to memory of 1904 2096 cmd.exe 29 PID 2096 wrote to memory of 1904 2096 cmd.exe 29 PID 2096 wrote to memory of 3020 2096 cmd.exe 30 PID 2096 wrote to memory of 3020 2096 cmd.exe 30 PID 2096 wrote to memory of 3020 2096 cmd.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\encryptedd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\system32\ipconfig.exeipconfig2⤵
- Gathers network information
PID:1904
-
-
C:\Windows\system32\findstr.exefindstr /i "IPv4 Address"2⤵PID:3020
-