Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20231215-de -
resource tags
arch:x64arch:x86image:win10-20231215-delocale:de-deos:windows10-1703-x64systemwindows -
submitted
03/02/2024, 21:46
Static task
static1
Behavioral task
behavioral1
Sample
GameOptimize.bat
Resource
win10-20231215-de
General
-
Target
GameOptimize.bat
-
Size
77KB
-
MD5
e7d4dc194b2c0323424915761914ddc0
-
SHA1
254de6d2ccb9842edd9a8123763531d0bd520ec7
-
SHA256
11d968219765dd9d0c4b162535320ef8b5dffd1bcf387da8ea3c546679711067
-
SHA512
6e6204de36488b1567ef253dacf50b9f2a74b7bc28c0c23003fce2d5b6a65ff5d0b64840b8157828355c6b593bff011ed818fcee0bae8c48c5d1aa74cec09d53
-
SSDEEP
768:z3rEb6dsF/gwIPC7NqGz6h8WSlw53Zppwu:YGwIPC7NqGz6hhSlMZppwu
Malware Config
Signatures
-
Delays execution with timeout.exe 6 IoCs
pid Process 2656 timeout.exe 688 timeout.exe 4768 timeout.exe 1840 timeout.exe 4248 timeout.exe 628 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1592 powershell.exe 1592 powershell.exe 1592 powershell.exe 3488 powershell.exe 3488 powershell.exe 3488 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1592 powershell.exe Token: SeDebugPrivilege 3488 powershell.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 3924 wrote to memory of 4236 3924 cmd.exe 74 PID 3924 wrote to memory of 4236 3924 cmd.exe 74 PID 3924 wrote to memory of 1592 3924 cmd.exe 75 PID 3924 wrote to memory of 1592 3924 cmd.exe 75 PID 3924 wrote to memory of 2696 3924 cmd.exe 78 PID 3924 wrote to memory of 2696 3924 cmd.exe 78 PID 3924 wrote to memory of 868 3924 cmd.exe 79 PID 3924 wrote to memory of 868 3924 cmd.exe 79 PID 3924 wrote to memory of 1804 3924 cmd.exe 80 PID 3924 wrote to memory of 1804 3924 cmd.exe 80 PID 3924 wrote to memory of 1324 3924 cmd.exe 81 PID 3924 wrote to memory of 1324 3924 cmd.exe 81 PID 3924 wrote to memory of 4264 3924 cmd.exe 82 PID 3924 wrote to memory of 4264 3924 cmd.exe 82 PID 3924 wrote to memory of 2656 3924 cmd.exe 83 PID 3924 wrote to memory of 2656 3924 cmd.exe 83 PID 3924 wrote to memory of 4780 3924 cmd.exe 84 PID 3924 wrote to memory of 4780 3924 cmd.exe 84 PID 3924 wrote to memory of 688 3924 cmd.exe 85 PID 3924 wrote to memory of 688 3924 cmd.exe 85 PID 3924 wrote to memory of 3356 3924 cmd.exe 86 PID 3924 wrote to memory of 3356 3924 cmd.exe 86 PID 3924 wrote to memory of 3488 3924 cmd.exe 87 PID 3924 wrote to memory of 3488 3924 cmd.exe 87 PID 3924 wrote to memory of 1392 3924 cmd.exe 88 PID 3924 wrote to memory of 1392 3924 cmd.exe 88 PID 3924 wrote to memory of 4768 3924 cmd.exe 89 PID 3924 wrote to memory of 4768 3924 cmd.exe 89 PID 3924 wrote to memory of 1840 3924 cmd.exe 90 PID 3924 wrote to memory of 1840 3924 cmd.exe 90 PID 3924 wrote to memory of 4248 3924 cmd.exe 91 PID 3924 wrote to memory of 4248 3924 cmd.exe 91 PID 3924 wrote to memory of 628 3924 cmd.exe 92 PID 3924 wrote to memory of 628 3924 cmd.exe 92
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\GameOptimize.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:4236
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Unrestricted -NoProfile Enable-ComputerRestore -Drive 'C:\'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1592
-
-
C:\Windows\system32\reg.exeReg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "RPSessionInterval" /f2⤵PID:2696
-
-
C:\Windows\system32\reg.exeReg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "DisableConfig" /f2⤵PID:868
-
-
C:\Windows\system32\reg.exeReg.exe add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "SystemRestorePointCreationFrequency" /t REG_DWORD /d 0 /f2⤵PID:1804
-
-
C:\Windows\system32\reg.exeReg.exe add "HKCU\CONSOLE" /v "VirtualTerminalLevel" /t REG_DWORD /d "1" /f2⤵PID:1324
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:4264
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:2656
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:4780
-
-
C:\Windows\system32\timeout.exetimeout 22⤵
- Delays execution with timeout.exe
PID:688
-
-
C:\Windows\system32\chcp.comchcp 4372⤵PID:3356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -NoProfile Expand-Archive 'C:\Users\Admin\AppData\Local\Temp\nvidiaProfileInspector.zip' -DestinationPath 'C:\Exmfree\'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
-
C:\Windows\system32\chcp.comchcp 650012⤵PID:1392
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:4768
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:1840
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:4248
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak2⤵
- Delays execution with timeout.exe
PID:628
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD517286868c0a043ae5d2ff5798b6a3163
SHA1b83b23cd57c7fb2c937f5bc18aeb7ddc955b5401
SHA25640321e18ed0b9eb7e3bc937d3e207ea2039ff45267483ddb4a51f7974475dac6
SHA512e15c11982c0569a389a7dbd0889edd1ef9a8ffb21c0e8ffadebc10e1353f4485524b18ca8e041c66c98d05fb984544da122755e6c2a25728453aeaf4175bdee1
-
Filesize
1KB
MD54c374f0120a53268b61cc512abe33f41
SHA18fb3c9f799d5ef94c6aebb2ff3ad11e8a949f6fa
SHA256106ab9b1c9472e391c093f0a7e75acb0ad6a6a441e78387a7cda8fb452892917
SHA5126f5b7add9ffea62aa267aad661685e85d5e3b843ab8531e9431bc1efa5e9d1524e96356b92c1aa24dbc19bb83ae1580c45e6448b72f1d7232be59173c1a51e36
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a