Analysis

  • max time kernel
    13s
  • max time network
    14s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12-01-2024 08:41

Errors

Reason
Machine shutdown

General

  • Target

    spoofer.bat

  • Size

    26KB

  • MD5

    71f3e121ed4c4edd93ed7e2eef18c60f

  • SHA1

    c2c10acae7ffe7c0d5ded9fe7603b0804dd743db

  • SHA256

    4b3c02fa1516c71b44708adee293fc0dff5a33fb989c1df8d26603ba3fcf0445

  • SHA512

    b2cf5ed127a15851264e75791d8f44c2fad28a03fa85c628fda08634f6c05f165e145f3615f509e3f84a59c173a2fffdfd6790d57484fa5f73f3fad27a9e3d8c

  • SSDEEP

    768:fBd3qX+ac4zOhpYBUtrwrhtAUIsTpt75qn:/4O

Score
8/10

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\spoofer.bat"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\system32\attrib.exe
      Attrib +r +h Greatgame.bat
      2⤵
      • Sets file to hidden
      • Views/modifies file attributes
      PID:2828
    • C:\Windows\system32\reg.exe
      reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ
      2⤵
      • Adds Run key to start application
      • Modifies registry key
      PID:2704
    • C:\Windows\system32\calc.exe
      calc
      2⤵
        PID:2664
      • C:\Windows\system32\cmd.exe
        cmd.exe
        2⤵
          PID:2668
        • C:\Windows\system32\cmd.exe
          cmd.exe
          2⤵
            PID:2416
          • C:\Windows\system32\cmd.exe
            cmd.exe
            2⤵
              PID:2088
            • C:\Windows\system32\attrib.exe
              Attrib +r +h
              2⤵
              • Sets file to hidden
              • Views/modifies file attributes
              PID:2716
            • C:\Windows\system32\rundll32.exe
              RUNDLL32 USER32.DLL.SwapMouseButton
              2⤵
                PID:2692
              • C:\Windows\system32\calc.exe
                calc
                2⤵
                  PID:2448
                • C:\Windows\system32\tskill.exe
                  tskill msnmsgr
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2928
                • C:\Windows\system32\tskill.exe
                  tskill LimeWire
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2260
                • C:\Windows\system32\tskill.exe
                  tskill NMain
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2780
                • C:\Windows\system32\tskill.exe
                  tskill iexplore
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2596
                • C:\Windows\system32\cmd.exe
                  cmd.exe
                  2⤵
                    PID:2884
                  • C:\Windows\system32\cmd.exe
                    cmd.exe
                    2⤵
                      PID:2756
                    • C:\Windows\system32\calc.exe
                      calc
                      2⤵
                        PID:2696
                      • C:\Windows\system32\msg.exe
                        msg * R.I.P
                        2⤵
                          PID:2796
                        • C:\Windows\system32\msg.exe
                          msg * R.I.P
                          2⤵
                            PID:2564
                          • C:\Windows\system32\shutdown.exe
                            shutdown -r -t 10 -c "VIRUS DETECTED"
                            2⤵
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2300
                          • C:\Windows\system32\cmd.exe
                            cmd.exe
                            2⤵
                              PID:1468
                            • C:\Windows\system32\cmd.exe
                              cmd.exe
                              2⤵
                                PID:292
                            • C:\Windows\system32\LogonUI.exe
                              "LogonUI.exe" /flags:0x0
                              1⤵
                                PID:2548
                              • C:\Windows\system32\LogonUI.exe
                                "LogonUI.exe" /flags:0x1
                                1⤵
                                  PID:1580

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • memory/1580-1-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/2548-0-0x0000000002D70000-0x0000000002D71000-memory.dmp

                                  Filesize

                                  4KB