Analysis

  • max time kernel
    524s
  • max time network
    533s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-01-2024 11:21

General

  • Target

    EXM_Premium_Tweaks_Updated.bat

  • Size

    671KB

  • MD5

    ddf58a74066626c7fee766bc37098b43

  • SHA1

    03ccb5c9bf270f2b7ad1e0b92419e1b7609aebdf

  • SHA256

    1fe528ffd9622a7ad3c6a7d343db9d4a8f89d948f91f2d685795f3a0c2370352

  • SHA512

    1943956adc080c3a0529471997f2ed54fd796ad793ce431760577df8ca17e6b293846a312106c7c39e68e8aa4f3986f653436e67a6de0246ff59cca164c98a09

  • SSDEEP

    3072:aDGzQbmbkAqA2xH7VkKEn14IZVvisLur+K3:aDGiVNEn14IZVvisL43

Score
10/10

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\EXM_Premium_Tweaks_Updated.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Windows\system32\reg.exe
      Reg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "RPSessionInterval" /f
      2⤵
        PID:860
      • C:\Windows\system32\reg.exe
        Reg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "DisableConfig" /f
        2⤵
          PID:852
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -ExecutionPolicy Unrestricted -NoProfile Enable-ComputerRestore -Drive 'C:\'
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4736
        • C:\Windows\system32\reg.exe
          Reg.exe add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "SystemRestorePointCreationFrequency" /t REG_DWORD /d 0 /f
          2⤵
            PID:436
          • C:\Windows\system32\reg.exe
            Reg.exe ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d "0" /f
            2⤵
            • UAC bypass
            PID:3652
          • C:\Windows\system32\reg.exe
            Reg.exe add "HKCU\CONSOLE" /v "VirtualTerminalLevel" /t REG_DWORD /d "1" /f
            2⤵
              PID:4708
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c wmic path Win32_UserAccount where name="Admin" get sid | findstr "S-"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2804
            • C:\Windows\system32\chcp.com
              chcp 65001
              2⤵
                PID:1900
            • C:\Windows\system32\findstr.exe
              findstr "S-"
              1⤵
                PID:1908
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic path Win32_UserAccount where name="Admin" get sid
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:4488

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_uvz4c2fs.fzg.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • memory/4736-0-0x000002367FB70000-0x000002367FB92000-memory.dmp

                Filesize

                136KB

              • memory/4736-10-0x00007FFEF9090000-0x00007FFEF9B51000-memory.dmp

                Filesize

                10.8MB

              • memory/4736-11-0x000002367FC30000-0x000002367FC40000-memory.dmp

                Filesize

                64KB

              • memory/4736-12-0x000002367FC30000-0x000002367FC40000-memory.dmp

                Filesize

                64KB

              • memory/4736-15-0x00007FFEF9090000-0x00007FFEF9B51000-memory.dmp

                Filesize

                10.8MB