Analysis

  • max time kernel
    141s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 02:51

General

  • Target

    黑客风云全套抓鸡工具/1433.bat

  • Size

    1KB

  • MD5

    8bb50b97954e49897d35746fe4a70e99

  • SHA1

    3ee42ada95d8e490472fe35b670495b1fad3043a

  • SHA256

    900aafbff9329e46eea707a49170c4bff998a9741fcd37e0b438cffcb8f57f29

  • SHA512

    48f64c49ea3a7b1910b9f4a62a7350d0f4b175c9b4e41bc12f6a2445faf45e9b4b4196ea846db07f77c1aa437d455617ad60914a389fc66c0aa6e87db3f1e516

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\黑客风云全套抓鸡工具\1433.bat"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\黑客风云全套抓鸡工具\ip.txt
      2⤵
        PID:1464

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\黑客风云全套抓鸡工具\ip.txt

            Filesize

            54B

            MD5

            a98106ecbf85347e426d43d63f71ba18

            SHA1

            447d8b07cc2babd20d63bb63191adf99a19df3f5

            SHA256

            e8d6cb43c55b5bf44a4973a3b9483dd8a2187d9af7d45afb10d0628f8e83d42d

            SHA512

            9bd0e82ef83a6c19ff1e4616dddf62fd990a4cf4eb3d94d4f3de8fbc42ea923e9238552d347e109ebf4bf119dfebb490b668cb3301a6a0e5b71ccaea9b593bfc