Analysis
-
max time kernel
13s -
max time network
15s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 05:19
Static task
static1
Behavioral task
behavioral1
Sample
virus31.bat
Resource
win10v2004-20231215-en
11 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
virus31.bat
-
Size
1KB
-
MD5
a42401cb47aac7e3876209252f1b3b61
-
SHA1
c46ec3b343848d7c33badd19b5fb0539f2bdefe2
-
SHA256
788523c660a809135c728ddc7cfcba58c13e4fd9a7cc74843bee9fd3311c8abd
-
SHA512
3abc626c4cdd86736aa346ea4b89a5e8072c1068e4e3fcc4796afb5d41c085cfe616fab7b78709456ec0816298b1bee426559ee62524053485983bfffea71d15
Score
8/10
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4796 attrib.exe 4284 attrib.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Greatgame reg.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Greatgame cmd.exe File opened for modification C:\Windows\Greatgame cmd.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "176" LogonUI.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings calc.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings calc.exe Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings calc.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 968 reg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2588 tskill.exe 2588 tskill.exe 4516 tskill.exe 4516 tskill.exe 2796 tskill.exe 2796 tskill.exe 4192 tskill.exe 4192 tskill.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 1868 shutdown.exe Token: SeRemoteShutdownPrivilege 1868 shutdown.exe Token: SeSystemtimePrivilege 2064 cmd.exe Token: SeSystemtimePrivilege 2064 cmd.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2352 OpenWith.exe 1920 OpenWith.exe 4520 OpenWith.exe 3452 LogonUI.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2064 wrote to memory of 3100 2064 cmd.exe 86 PID 2064 wrote to memory of 3100 2064 cmd.exe 86 PID 2064 wrote to memory of 2816 2064 cmd.exe 91 PID 2064 wrote to memory of 2816 2064 cmd.exe 91 PID 2064 wrote to memory of 1860 2064 cmd.exe 87 PID 2064 wrote to memory of 1860 2064 cmd.exe 87 PID 2064 wrote to memory of 3560 2064 cmd.exe 92 PID 2064 wrote to memory of 3560 2064 cmd.exe 92 PID 2064 wrote to memory of 968 2064 cmd.exe 93 PID 2064 wrote to memory of 968 2064 cmd.exe 93 PID 2064 wrote to memory of 4796 2064 cmd.exe 94 PID 2064 wrote to memory of 4796 2064 cmd.exe 94 PID 2064 wrote to memory of 4284 2064 cmd.exe 95 PID 2064 wrote to memory of 4284 2064 cmd.exe 95 PID 2064 wrote to memory of 3808 2064 cmd.exe 96 PID 2064 wrote to memory of 3808 2064 cmd.exe 96 PID 2064 wrote to memory of 3608 2064 cmd.exe 97 PID 2064 wrote to memory of 3608 2064 cmd.exe 97 PID 2064 wrote to memory of 2588 2064 cmd.exe 98 PID 2064 wrote to memory of 2588 2064 cmd.exe 98 PID 2064 wrote to memory of 4516 2064 cmd.exe 99 PID 2064 wrote to memory of 4516 2064 cmd.exe 99 PID 2064 wrote to memory of 2796 2064 cmd.exe 100 PID 2064 wrote to memory of 2796 2064 cmd.exe 100 PID 2064 wrote to memory of 4192 2064 cmd.exe 101 PID 2064 wrote to memory of 4192 2064 cmd.exe 101 PID 2064 wrote to memory of 5000 2064 cmd.exe 102 PID 2064 wrote to memory of 5000 2064 cmd.exe 102 PID 2064 wrote to memory of 660 2064 cmd.exe 105 PID 2064 wrote to memory of 660 2064 cmd.exe 105 PID 2064 wrote to memory of 2884 2064 cmd.exe 104 PID 2064 wrote to memory of 2884 2064 cmd.exe 104 PID 2064 wrote to memory of 4536 2064 cmd.exe 107 PID 2064 wrote to memory of 4536 2064 cmd.exe 107 PID 2064 wrote to memory of 4388 2064 cmd.exe 109 PID 2064 wrote to memory of 4388 2064 cmd.exe 109 PID 2064 wrote to memory of 1868 2064 cmd.exe 110 PID 2064 wrote to memory of 1868 2064 cmd.exe 110 PID 2064 wrote to memory of 1660 2064 cmd.exe 115 PID 2064 wrote to memory of 1660 2064 cmd.exe 115 PID 2064 wrote to memory of 4392 2064 cmd.exe 114 PID 2064 wrote to memory of 4392 2064 cmd.exe 114 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4796 attrib.exe 4284 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\virus31.bat"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\system32\cmd.execmd.exe2⤵PID:3100
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1860
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:2816
-
-
C:\Windows\system32\calc.execalc2⤵
- Modifies registry class
PID:3560
-
-
C:\Windows\system32\reg.exereg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ2⤵
- Adds Run key to start application
- Modifies registry key
PID:968
-
-
C:\Windows\system32\attrib.exeAttrib +r +h Greatgame.bat2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4796
-
-
C:\Windows\system32\attrib.exeAttrib +r +h2⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4284
-
-
C:\Windows\system32\rundll32.exeRUNDLL32 USER32.DLL.SwapMouseButton2⤵PID:3808
-
-
C:\Windows\system32\calc.execalc2⤵
- Modifies registry class
PID:3608
-
-
C:\Windows\system32\tskill.exetskill msnmsgr2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2588
-
-
C:\Windows\system32\tskill.exetskill LimeWire2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Windows\system32\tskill.exetskill iexplore2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
-
C:\Windows\system32\tskill.exetskill NMain2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:5000
-
-
C:\Windows\system32\calc.execalc2⤵
- Modifies registry class
PID:2884
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:660
-
-
C:\Windows\system32\msg.exemsg * R.I.P2⤵PID:4536
-
-
C:\Windows\system32\msg.exemsg * R.I.P2⤵PID:4388
-
-
C:\Windows\system32\shutdown.exeshutdown -r -t 10 -c "VIRUS DETECTED"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:4392
-
-
C:\Windows\system32\cmd.execmd.exe2⤵PID:1660
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2352
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1920
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4520
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3944855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:3452