General
-
Target
CoffeeBruh125.bat
-
Size
1KB
-
Sample
231016-wb2ltach72
-
MD5
c052f617d0de8f3f6548c81497114662
-
SHA1
eca644aeec5e0a628c9e4156a5f0eefdb6ff3e6e
-
SHA256
c354543fbd5eb1bea778705fee99c7471de9086708dc0b13899c561051dca5e9
-
SHA512
fd9455aac8ac9f2655e033f87ac9517b2c28d65e4e09ae84da670b677041e5941ff53ba037176aa3f16f4e58dc1b3cf154d89f6f195908bc99ce575774ff3673
Static task
static1
Behavioral task
behavioral1
Sample
CoffeeBruh125.bat
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
CoffeeBruh125.bat
-
Size
1KB
-
MD5
c052f617d0de8f3f6548c81497114662
-
SHA1
eca644aeec5e0a628c9e4156a5f0eefdb6ff3e6e
-
SHA256
c354543fbd5eb1bea778705fee99c7471de9086708dc0b13899c561051dca5e9
-
SHA512
fd9455aac8ac9f2655e033f87ac9517b2c28d65e4e09ae84da670b677041e5941ff53ba037176aa3f16f4e58dc1b3cf154d89f6f195908bc99ce575774ff3673
Score8/10-
Modifies Installed Components in the registry
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2