Analysis

  • max time kernel
    13s
  • max time network
    15s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/01/2024, 05:19

Errors

Reason
Machine shutdown

General

  • Target

    virus31.bat

  • Size

    1KB

  • MD5

    a42401cb47aac7e3876209252f1b3b61

  • SHA1

    c46ec3b343848d7c33badd19b5fb0539f2bdefe2

  • SHA256

    788523c660a809135c728ddc7cfcba58c13e4fd9a7cc74843bee9fd3311c8abd

  • SHA512

    3abc626c4cdd86736aa346ea4b89a5e8072c1068e4e3fcc4796afb5d41c085cfe616fab7b78709456ec0816298b1bee426559ee62524053485983bfffea71d15

Score
8/10

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 3 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\virus31.bat"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2064
    • C:\Windows\system32\cmd.exe
      cmd.exe
      2⤵
        PID:3100
      • C:\Windows\system32\cmd.exe
        cmd.exe
        2⤵
          PID:1860
        • C:\Windows\system32\cmd.exe
          cmd.exe
          2⤵
            PID:2816
          • C:\Windows\system32\calc.exe
            calc
            2⤵
            • Modifies registry class
            PID:3560
          • C:\Windows\system32\reg.exe
            reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ
            2⤵
            • Adds Run key to start application
            • Modifies registry key
            PID:968
          • C:\Windows\system32\attrib.exe
            Attrib +r +h Greatgame.bat
            2⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:4796
          • C:\Windows\system32\attrib.exe
            Attrib +r +h
            2⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:4284
          • C:\Windows\system32\rundll32.exe
            RUNDLL32 USER32.DLL.SwapMouseButton
            2⤵
              PID:3808
            • C:\Windows\system32\calc.exe
              calc
              2⤵
              • Modifies registry class
              PID:3608
            • C:\Windows\system32\tskill.exe
              tskill msnmsgr
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2588
            • C:\Windows\system32\tskill.exe
              tskill LimeWire
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:4516
            • C:\Windows\system32\tskill.exe
              tskill iexplore
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:2796
            • C:\Windows\system32\tskill.exe
              tskill NMain
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              PID:4192
            • C:\Windows\system32\cmd.exe
              cmd.exe
              2⤵
                PID:5000
              • C:\Windows\system32\calc.exe
                calc
                2⤵
                • Modifies registry class
                PID:2884
              • C:\Windows\system32\cmd.exe
                cmd.exe
                2⤵
                  PID:660
                • C:\Windows\system32\msg.exe
                  msg * R.I.P
                  2⤵
                    PID:4536
                  • C:\Windows\system32\msg.exe
                    msg * R.I.P
                    2⤵
                      PID:4388
                    • C:\Windows\system32\shutdown.exe
                      shutdown -r -t 10 -c "VIRUS DETECTED"
                      2⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1868
                    • C:\Windows\system32\cmd.exe
                      cmd.exe
                      2⤵
                        PID:4392
                      • C:\Windows\system32\cmd.exe
                        cmd.exe
                        2⤵
                          PID:1660
                      • C:\Windows\system32\OpenWith.exe
                        C:\Windows\system32\OpenWith.exe -Embedding
                        1⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:2352
                      • C:\Windows\system32\OpenWith.exe
                        C:\Windows\system32\OpenWith.exe -Embedding
                        1⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:1920
                      • C:\Windows\system32\OpenWith.exe
                        C:\Windows\system32\OpenWith.exe -Embedding
                        1⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:4520
                      • C:\Windows\system32\LogonUI.exe
                        "LogonUI.exe" /flags:0x4 /state0:0xa3944855 /state1:0x41c64e6d
                        1⤵
                        • Modifies data under HKEY_USERS
                        • Suspicious use of SetWindowsHookEx
                        PID:3452

                      Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads