Analysis

  • max time kernel
    139s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2023, 04:41

General

  • Target

    WINPG_V4_279/WINPG32.bat

  • Size

    423B

  • MD5

    cbf394ff14a9f4e6dc0b2039caf5e79c

  • SHA1

    7218848b9fe9bb1a97290fcf957cc346b3a464bf

  • SHA256

    81cfd6bc9b3967b20a364dbc92df9aa9d256bdae0962279b7f3c561e9464138f

  • SHA512

    277f79d4c5f529258fda7cb881850de3887e79b6cc359d7b2cb93e221b9b8ff0de422ce4b087268a1c94380afbfc87e21f253eb423e473160ea8398d3c4a6995

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Runs net.exe
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\WINPG_V4_279\WINPG32.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:260
    • C:\Windows\system32\net.exe
      net stop DashClientService
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4800
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 stop DashClientService
        3⤵
          PID:2924
      • C:\Users\Admin\AppData\Local\Temp\WINPG_V4_279\devcon32.exe
        devcon32.exe disable "PCI\VEN_10EC&DEV_8131" "PCI\VEN_10EC&DEV_8136" "PCI\VEN_10EC&DEV_8137" "PCI\VEN_10EC&DEV_8168" "PCI\VEN_10EC&DEV_8161" "PCI\VEN_10EC&DEV_8169" "PCI\VEN_10EC&DEV_8167" "PCI\VEN_10EC&DEV_8125" "PCI\VEN_10EC&DEV_8162" "PCI\VEN_10EC&DEV_8126"
        2⤵
        • Checks SCSI registry key(s)
        PID:880
      • C:\Users\Admin\AppData\Local\Temp\WINPG_V4_279\RTNicPgW32.exe
        RTNicPgW32.exe /eeprom /r
        2⤵
          PID:4412
        • C:\Users\Admin\AppData\Local\Temp\WINPG_V4_279\devcon32.exe
          devcon32.exe rescan
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1324
        • C:\Users\Admin\AppData\Local\Temp\WINPG_V4_279\devcon32.exe
          devcon32.exe enable "PCI\VEN_10EC&DEV_8131" "PCI\VEN_10EC&DEV_8136" "PCI\VEN_10EC&DEV_8137" "PCI\VEN_10EC&DEV_8168" "PCI\VEN_10EC&DEV_8161" "PCI\VEN_10EC&DEV_8169" "PCI\VEN_10EC&DEV_8167" "PCI\VEN_10EC&DEV_8125" "PCI\VEN_10EC&DEV_8162" "PCI\VEN_10EC&DEV_8126"
          2⤵
          • Checks SCSI registry key(s)
          PID:3192
        • C:\Windows\system32\net.exe
          net start DashClientService
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4388
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 start DashClientService
            3⤵
              PID:1532

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads