Analysis
-
max time kernel
279s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 11:58
Static task
static1
Behavioral task
behavioral1
Sample
L0Lz.bat
Resource
win10v2004-20231215-en
6 signatures
600 seconds
General
-
Target
L0Lz.bat
-
Size
6KB
-
MD5
74f8a282848b8a26ceafe1f438e358e0
-
SHA1
007b350c49b71b47dfc8dff003980d5f8da32b3a
-
SHA256
fc94130b45112bdf7fe64713eb807f4958cdcdb758c25605ad9318cd5a8e17ae
-
SHA512
3f73c734432b7999116452e673d734aa3f5fe9005efa7285c76d28a98b4c5d2620e772f421e030401ad223abbb07c6d0e79b91aa97b7464cb21e3dc0b49c5a81
-
SSDEEP
192:tlYUT1jLPD5mZkRr3TfLQ4/zus8joPRJRqU1jXEmo:tlY85XW
Score
8/10
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 4640 netsh.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat xcopy.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat xcopy.exe -
Kills process with taskkill 1 IoCs
pid Process 2744 taskkill.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2744 taskkill.exe Token: SeDebugPrivilege 3616 whoami.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4780 wrote to memory of 1996 4780 cmd.exe 86 PID 4780 wrote to memory of 1996 4780 cmd.exe 86 PID 1996 wrote to memory of 2072 1996 net.exe 87 PID 1996 wrote to memory of 2072 1996 net.exe 87 PID 4780 wrote to memory of 2920 4780 cmd.exe 88 PID 4780 wrote to memory of 2920 4780 cmd.exe 88 PID 2920 wrote to memory of 4664 2920 net.exe 89 PID 2920 wrote to memory of 4664 2920 net.exe 89 PID 4780 wrote to memory of 984 4780 cmd.exe 91 PID 4780 wrote to memory of 984 4780 cmd.exe 91 PID 984 wrote to memory of 1136 984 net.exe 90 PID 984 wrote to memory of 1136 984 net.exe 90 PID 4780 wrote to memory of 2744 4780 cmd.exe 92 PID 4780 wrote to memory of 2744 4780 cmd.exe 92 PID 4780 wrote to memory of 5008 4780 cmd.exe 94 PID 4780 wrote to memory of 5008 4780 cmd.exe 94 PID 5008 wrote to memory of 388 5008 net.exe 95 PID 5008 wrote to memory of 388 5008 net.exe 95 PID 4780 wrote to memory of 4020 4780 cmd.exe 96 PID 4780 wrote to memory of 4020 4780 cmd.exe 96 PID 4020 wrote to memory of 2064 4020 net.exe 97 PID 4020 wrote to memory of 2064 4020 net.exe 97 PID 4780 wrote to memory of 4640 4780 cmd.exe 98 PID 4780 wrote to memory of 4640 4780 cmd.exe 98 PID 4780 wrote to memory of 1464 4780 cmd.exe 100 PID 4780 wrote to memory of 1464 4780 cmd.exe 100 PID 1464 wrote to memory of 4288 1464 net.exe 99 PID 1464 wrote to memory of 4288 1464 net.exe 99 PID 4780 wrote to memory of 4088 4780 cmd.exe 101 PID 4780 wrote to memory of 4088 4780 cmd.exe 101 PID 4780 wrote to memory of 848 4780 cmd.exe 102 PID 4780 wrote to memory of 848 4780 cmd.exe 102 PID 4780 wrote to memory of 4688 4780 cmd.exe 103 PID 4780 wrote to memory of 4688 4780 cmd.exe 103 PID 4780 wrote to memory of 4800 4780 cmd.exe 104 PID 4780 wrote to memory of 4800 4780 cmd.exe 104 PID 4780 wrote to memory of 4340 4780 cmd.exe 109 PID 4780 wrote to memory of 4340 4780 cmd.exe 109 PID 4780 wrote to memory of 4984 4780 cmd.exe 112 PID 4780 wrote to memory of 4984 4780 cmd.exe 112 PID 4780 wrote to memory of 2320 4780 cmd.exe 113 PID 4780 wrote to memory of 2320 4780 cmd.exe 113 PID 4780 wrote to memory of 4168 4780 cmd.exe 114 PID 4780 wrote to memory of 4168 4780 cmd.exe 114 PID 4780 wrote to memory of 2276 4780 cmd.exe 115 PID 4780 wrote to memory of 2276 4780 cmd.exe 115 PID 1744 wrote to memory of 3616 1744 cmd.exe 126 PID 1744 wrote to memory of 3616 1744 cmd.exe 126
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\L0Lz.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:2072
-
-
-
C:\Windows\system32\net.exenet stop "SDRSVC"2⤵
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "SDRSVC"3⤵PID:4664
-
-
-
C:\Windows\system32\net.exenet stop "WinDefend"2⤵
- Suspicious use of WriteProcessMemory
PID:984
-
-
C:\Windows\system32\taskkill.exetaskkill /f /t /im "MSASCui.exe"2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\system32\net.exenet stop "security center"2⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "security center"3⤵PID:388
-
-
-
C:\Windows\system32\net.exenet stop sharedaccess2⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sharedaccess3⤵PID:2064
-
-
-
C:\Windows\system32\netsh.exenetsh firewall set opmode mode-disable2⤵
- Modifies Windows Firewall
PID:4640
-
-
C:\Windows\system32\net.exenet stop "wuauserv"2⤵
- Suspicious use of WriteProcessMemory
PID:1464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo tasklist "2⤵PID:4088
-
-
C:\Windows\system32\find.exefind /I "L0Lz"2⤵PID:848
-
-
C:\Windows\system32\xcopy.exeXCOPY "BitcoinMiner.bat" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"2⤵
- Drops startup file
PID:4688
-
-
C:\Windows\system32\xcopy.exeXCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"2⤵PID:4800
-
-
C:\Windows\system32\xcopy.exeXCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"2⤵PID:4340
-
-
C:\Windows\system32\xcopy.exeXCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"2⤵PID:4984
-
-
C:\Windows\system32\xcopy.exeXCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"2⤵PID:2320
-
-
C:\Windows\system32\xcopy.exeXCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"2⤵PID:4168
-
-
C:\Windows\system32\xcopy.exeXCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"2⤵PID:2276
-
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "WinDefend"1⤵PID:1136
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "wuauserv"1⤵PID:4288
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3520
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\system32\whoami.exewhoami2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
269B
MD5f971f4ae767fafa564b3f9266027599a
SHA1df04f7017164d35943c959a057a8f24994724ba6
SHA256a45d90c80db74841afc1658c8db4566288ff21f76f89f382cd3dc675fd783f2c
SHA512a459640d96a1abb5ee347171db77801c6e10fde2b2164288c3908c7cc5c472ed9e779993a5761c82fdc946867f1525993e75eee7112c211d1283a97d043f9bee