Analysis
-
max time kernel
72s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
07/11/2023, 09:29
Static task
static1
Behavioral task
behavioral1
Sample
destructive.bat
Resource
win7-20231020-en
General
-
Target
destructive.bat
-
Size
1KB
-
MD5
f8a6219845a2a7af853e805cfd1f11ee
-
SHA1
a976983be983f4429d4cd6988d53456c70d16156
-
SHA256
499016db0bea52f9232f50265e50b74e4e6534310a032f92b14bc2985eccb28d
-
SHA512
ca446a1995ee18ec4e55b5a46ee893ebc8582aa3ec8b0fe886d87244b66f0884cda39bd5b9a38697fe4235bf608d2d11119f4f931a4a74bb4021e9b394433567
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2060 cmd.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2888 chrome.exe 2888 chrome.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe Token: SeShutdownPrivilege 2888 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe 2888 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2124 2060 cmd.exe 29 PID 2060 wrote to memory of 2124 2060 cmd.exe 29 PID 2060 wrote to memory of 2124 2060 cmd.exe 29 PID 2060 wrote to memory of 2664 2060 cmd.exe 30 PID 2060 wrote to memory of 2664 2060 cmd.exe 30 PID 2060 wrote to memory of 2664 2060 cmd.exe 30 PID 2060 wrote to memory of 2132 2060 cmd.exe 31 PID 2060 wrote to memory of 2132 2060 cmd.exe 31 PID 2060 wrote to memory of 2132 2060 cmd.exe 31 PID 2060 wrote to memory of 2280 2060 cmd.exe 32 PID 2060 wrote to memory of 2280 2060 cmd.exe 32 PID 2060 wrote to memory of 2280 2060 cmd.exe 32 PID 2888 wrote to memory of 2908 2888 chrome.exe 36 PID 2888 wrote to memory of 2908 2888 chrome.exe 36 PID 2888 wrote to memory of 2908 2888 chrome.exe 36 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1976 2888 chrome.exe 38 PID 2888 wrote to memory of 1776 2888 chrome.exe 39 PID 2888 wrote to memory of 1776 2888 chrome.exe 39 PID 2888 wrote to memory of 1776 2888 chrome.exe 39 PID 2888 wrote to memory of 276 2888 chrome.exe 40 PID 2888 wrote to memory of 276 2888 chrome.exe 40 PID 2888 wrote to memory of 276 2888 chrome.exe 40 PID 2888 wrote to memory of 276 2888 chrome.exe 40 PID 2888 wrote to memory of 276 2888 chrome.exe 40 PID 2888 wrote to memory of 276 2888 chrome.exe 40 PID 2888 wrote to memory of 276 2888 chrome.exe 40 -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 2124 attrib.exe 2664 attrib.exe 2132 attrib.exe 2280 attrib.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\destructive.bat"1⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\system32\attrib.exeattrib -r -s -h c:autoexec.bat2⤵
- Views/modifies file attributes
PID:2124
-
-
C:\Windows\system32\attrib.exeattrib -r -s -h c:boot.ini2⤵
- Views/modifies file attributes
PID:2664
-
-
C:\Windows\system32\attrib.exeattrib -r -s -h c:ntldr2⤵
- Views/modifies file attributes
PID:2132
-
-
C:\Windows\system32\attrib.exeattrib -r -s -h c:windowswin.ini2⤵
- Views/modifies file attributes
PID:2280
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:2936
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef58c9758,0x7fef58c9768,0x7fef58c97782⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1164 --field-trial-handle=1180,i,15174645114517428841,11302984171583891465,131072 /prefetch:22⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1180,i,15174645114517428841,11302984171583891465,131072 /prefetch:82⤵PID:1776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1180,i,15174645114517428841,11302984171583891465,131072 /prefetch:82⤵PID:276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2316 --field-trial-handle=1180,i,15174645114517428841,11302984171583891465,131072 /prefetch:12⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2328 --field-trial-handle=1180,i,15174645114517428841,11302984171583891465,131072 /prefetch:12⤵PID:2792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1340 --field-trial-handle=1180,i,15174645114517428841,11302984171583891465,131072 /prefetch:22⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2260 --field-trial-handle=1180,i,15174645114517428841,11302984171583891465,131072 /prefetch:12⤵PID:1192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3448 --field-trial-handle=1180,i,15174645114517428841,11302984171583891465,131072 /prefetch:82⤵PID:1188
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3476 --field-trial-handle=1180,i,15174645114517428841,11302984171583891465,131072 /prefetch:82⤵PID:1636
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --reenable-autoupdates --system-level2⤵PID:3036
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13f657688,0x13f657698,0x13f6576a83⤵PID:1456
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2784 --field-trial-handle=1180,i,15174645114517428841,11302984171583891465,131072 /prefetch:82⤵PID:2652
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2344
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1792
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
220KB
MD58400f3a486388a7178d392cf9c09a823
SHA1994db27f39a9a8a0964546c213a40efa6f01259d
SHA2569d15d2e9ac8c485cbd16ebdf4ab8913a40da2972f9160d732f9c6ec5e5dcf7bb
SHA5121bb65c0bea8eed1c34f1f19c562c20389edebc684c13008fabf5b1828a9ce3e9bb74604b59d95db39e6b8aea93f8af8398b11318cfa5f80e802fbe07ae9acd70