Analysis
-
max time kernel
87s -
max time network
95s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
24-12-2023 04:10
Static task
static1
Behavioral task
behavioral1
Sample
kevinn.bat
Resource
win11-20231215-en
windows11-21h2-x64
2 signatures
150 seconds
General
-
Target
kevinn.bat
-
Size
3KB
-
MD5
353029698b5eb569fddc1dcc7a75f458
-
SHA1
7ab8ad9f5fed08ced5dec12054c4150acdd8a8c8
-
SHA256
7c8cf3c22136bb3fedd11a2b46165350e62041d5873d79d8a9d39d6edbd45750
-
SHA512
a9790bf662e790832dd81f4147d7d11ebcb533f3117b9f0a28ab98549ce5e81609bab62638cf1085d69018c4e7f8cd261795c002be9ee74daa57d7dcd2d4b710
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 5072 wrote to memory of 2836 5072 cmd.exe 81 PID 5072 wrote to memory of 2836 5072 cmd.exe 81 PID 5072 wrote to memory of 3064 5072 cmd.exe 82 PID 5072 wrote to memory of 3064 5072 cmd.exe 82 PID 5072 wrote to memory of 2292 5072 cmd.exe 83 PID 5072 wrote to memory of 2292 5072 cmd.exe 83 PID 5072 wrote to memory of 2768 5072 cmd.exe 84 PID 5072 wrote to memory of 2768 5072 cmd.exe 84 PID 5072 wrote to memory of 544 5072 cmd.exe 85 PID 5072 wrote to memory of 544 5072 cmd.exe 85 PID 5072 wrote to memory of 4424 5072 cmd.exe 86 PID 5072 wrote to memory of 4424 5072 cmd.exe 86 PID 5072 wrote to memory of 3616 5072 cmd.exe 87 PID 5072 wrote to memory of 3616 5072 cmd.exe 87 PID 5072 wrote to memory of 224 5072 cmd.exe 88 PID 5072 wrote to memory of 224 5072 cmd.exe 88 PID 5072 wrote to memory of 3936 5072 cmd.exe 89 PID 5072 wrote to memory of 3936 5072 cmd.exe 89 PID 5072 wrote to memory of 5028 5072 cmd.exe 90 PID 5072 wrote to memory of 5028 5072 cmd.exe 90 PID 5072 wrote to memory of 4940 5072 cmd.exe 91 PID 5072 wrote to memory of 4940 5072 cmd.exe 91 PID 5072 wrote to memory of 2316 5072 cmd.exe 92 PID 5072 wrote to memory of 2316 5072 cmd.exe 92 PID 5072 wrote to memory of 1608 5072 cmd.exe 93 PID 5072 wrote to memory of 1608 5072 cmd.exe 93 -
Views/modifies file attributes 1 TTPs 7 IoCs
pid Process 224 attrib.exe 5028 attrib.exe 2316 attrib.exe 2836 attrib.exe 3064 attrib.exe 2768 attrib.exe 4424 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\kevinn.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\system32\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\kevinn.bat2⤵
- Views/modifies file attributes
PID:2836
-
-
C:\Windows\system32\attrib.exeattrib +h /s /d2⤵
- Views/modifies file attributes
PID:3064
-
-
C:\Windows\system32\cipher.execipher /e /s /a2⤵PID:2292
-
-
C:\Windows\system32\attrib.exeattrib +h /s /d2⤵
- Views/modifies file attributes
PID:2768
-
-
C:\Windows\system32\cipher.execipher /e /s /a2⤵PID:544
-
-
C:\Windows\system32\attrib.exeattrib +h /s /d2⤵
- Views/modifies file attributes
PID:4424
-
-
C:\Windows\system32\cipher.execipher /e /s /a2⤵PID:3616
-
-
C:\Windows\system32\attrib.exeattrib +h /s /d2⤵
- Views/modifies file attributes
PID:224
-
-
C:\Windows\system32\cipher.execipher /e /s /a2⤵PID:3936
-
-
C:\Windows\system32\attrib.exeattrib +h /s /d2⤵
- Views/modifies file attributes
PID:5028
-
-
C:\Windows\system32\cipher.execipher /e /s /a2⤵PID:4940
-
-
C:\Windows\system32\attrib.exeattrib +h /s /d2⤵
- Views/modifies file attributes
PID:2316
-
-
C:\Windows\system32\cipher.execipher /e /s /a2⤵PID:1608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132B
MD5460791485d870c39dc5273ea2ddfc119
SHA1a247fb46e29831ebea2c4984061a1c80ed67295f
SHA256257ea28c54cdb0fea4cb56dd97067978cde53585872fe22eb6f152d20bff1251
SHA512e64ef367731ba22232fb1112aeafc0f2098a05321098f481d45e6e10b74ff645ed644c8c511e5cfafcf16e0da9c91c2641ed5aa8f6fbb36a43445d013f0e3e52