Analysis
-
max time kernel
0s -
platform
windows11-21h2_x64 -
resource
win11-20231128-en -
resource tags
arch:x64arch:x86image:win11-20231128-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-12-2023 20:36
Static task
static1
Behavioral task
behavioral1
Sample
Pankoza-visuals.bat
Resource
win7-20231201-en
windows7-x64
2 signatures
1800 seconds
Behavioral task
behavioral2
Sample
Pankoza-visuals.bat
Resource
win10-20231129-en
windows10-1703-x64
2 signatures
1800 seconds
Behavioral task
behavioral3
Sample
Pankoza-visuals.bat
Resource
win10v2004-20231127-en
windows10-2004-x64
2 signatures
1800 seconds
Behavioral task
behavioral4
Sample
Pankoza-visuals.bat
Resource
win11-20231128-en
windows11-21h2-x64
2 signatures
1800 seconds
General
-
Target
Pankoza-visuals.bat
-
Size
2KB
-
MD5
15121a080fda7e3b44ac186cd15685aa
-
SHA1
5bd1fb05994839ec6a045f53f4b9039a5412a532
-
SHA256
20441a64d0088854c884b477841c3067b20507540b23e568646b1d36e5cd48af
-
SHA512
7d6661538e073e0dc695fedd24e4af5ca77f50d11a7812b7b8bede7db4350f1fd1923f2240d8e006bd6a01948d60dc8f13588a577937485314efb8e9819fad15
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 21 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3360 WMIC.exe Token: SeSecurityPrivilege 3360 WMIC.exe Token: SeTakeOwnershipPrivilege 3360 WMIC.exe Token: SeLoadDriverPrivilege 3360 WMIC.exe Token: SeSystemProfilePrivilege 3360 WMIC.exe Token: SeSystemtimePrivilege 3360 WMIC.exe Token: SeProfSingleProcessPrivilege 3360 WMIC.exe Token: SeIncBasePriorityPrivilege 3360 WMIC.exe Token: SeCreatePagefilePrivilege 3360 WMIC.exe Token: SeBackupPrivilege 3360 WMIC.exe Token: SeRestorePrivilege 3360 WMIC.exe Token: SeShutdownPrivilege 3360 WMIC.exe Token: SeDebugPrivilege 3360 WMIC.exe Token: SeSystemEnvironmentPrivilege 3360 WMIC.exe Token: SeRemoteShutdownPrivilege 3360 WMIC.exe Token: SeUndockPrivilege 3360 WMIC.exe Token: SeManageVolumePrivilege 3360 WMIC.exe Token: 33 3360 WMIC.exe Token: 34 3360 WMIC.exe Token: 35 3360 WMIC.exe Token: 36 3360 WMIC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5056 wrote to memory of 3668 5056 cmd.exe 64 PID 5056 wrote to memory of 3668 5056 cmd.exe 64 PID 3668 wrote to memory of 3360 3668 cmd.exe 80 PID 3668 wrote to memory of 3360 3668 cmd.exe 80
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Pankoza-visuals.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wmic desktopmonitor get screenwidth screenheight /Format:List2⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\System32\Wbem\WMIC.exewmic desktopmonitor get screenwidth screenheight /Format:List3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3360
-
-