Analysis

  • max time kernel
    117s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    18-02-2024 02:05

General

  • Target

    dependencies/2024-1-12/auth..bat

  • Size

    6KB

  • MD5

    8825cf897e698ebbdb8c707bb39d73ca

  • SHA1

    dcece549ce6ed0b24ecc1faf80280c225bdcccae

  • SHA256

    b332d0f81de5a8eced6109033f05192e2aa5ca3ed0a523367428813924a9a28d

  • SHA512

    e3c63dda17128929108ff5492364b4d2df8126f2a8c17d7384ba9f7b0651aec72c11681dd7196f2eef7d693b9b3165b96fc05c98afc40fab9252ef2c7a26e3f9

  • SSDEEP

    192:sYHAivgiRwe5f11ATNLCAtMT7/4+tGs1PP/uQz8tz1hNn:8i4iRwe5f11ATNLCAtMT7/4+tGs1PP/M

Malware Config

Signatures

  • Sets file to hidden 1 TTPs 1 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Delays execution with timeout.exe 11 IoCs
  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\dependencies\2024-1-12\auth..bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell start -verb runas 'C:\Users\Admin\AppData\Local\Temp\dependencies\2024-1-12\auth..bat' am_admin
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dependencies\2024-1-12\auth..bat" am_admin
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2072
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c 2>NUL ping -4 -n 1 SCFGBRBT | findstr [
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2600
          • C:\Windows\system32\PING.EXE
            ping -4 -n 1 SCFGBRBT
            5⤵
            • Runs ping.exe
            PID:2588
          • C:\Windows\system32\findstr.exe
            findstr [
            5⤵
              PID:2664
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c powershell Invoke-RestMethod api.ipify.org
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2700
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell Invoke-RestMethod api.ipify.org
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2668
          • C:\Windows\system32\attrib.exe
            attrib "C:\ProgramData\s.exe" +h
            4⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:2624
          • C:\Windows\system32\timeout.exe
            timeout /t 5 /nobreak
            4⤵
            • Delays execution with timeout.exe
            PID:2500
          • C:\Windows\system32\systeminfo.exe
            SystemInfo
            4⤵
            • Gathers system information
            PID:2460
          • C:\Windows\system32\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2528
          • C:\Windows\system32\net.exe
            net user
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:856
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 user
              5⤵
                PID:1872
            • C:\Windows\system32\reg.exe
              reg query HKCU\Software\Microsoft\Windows\CurrentVersion\Run
              4⤵
              • Modifies registry key
              PID:1640
            • C:\Windows\system32\ipconfig.exe
              ipconfig /all
              4⤵
              • Gathers network information
              PID:2496
            • C:\Windows\system32\timeout.exe
              timeout /t 2 /nobreak
              4⤵
              • Delays execution with timeout.exe
              PID:1664
            • C:\Windows\system32\timeout.exe
              timeout /t 2 /nobreak
              4⤵
              • Delays execution with timeout.exe
              PID:1340
            • C:\Windows\system32\timeout.exe
              timeout /t 2 /nobreak
              4⤵
              • Delays execution with timeout.exe
              PID:2780
            • C:\Windows\system32\timeout.exe
              timeout /t 2 /nobreak
              4⤵
              • Delays execution with timeout.exe
              PID:2836
            • C:\Windows\system32\timeout.exe
              timeout /t 2 /nobreak
              4⤵
              • Delays execution with timeout.exe
              PID:2800
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles"
              4⤵
                PID:2008
              • C:\Windows\system32\timeout.exe
                timeout /t 2 /nobreak
                4⤵
                • Delays execution with timeout.exe
                PID:2180
              • C:\Windows\system32\timeout.exe
                timeout /t 2 /nobreak
                4⤵
                • Delays execution with timeout.exe
                PID:1420
              • C:\Windows\system32\timeout.exe
                timeout /t 2 /nobreak
                4⤵
                • Delays execution with timeout.exe
                PID:1076
              • C:\Windows\system32\timeout.exe
                timeout /t 2 /nobreak
                4⤵
                • Delays execution with timeout.exe
                PID:1112
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Users\Admin\AppData\Roaming\discord\Local Storage\leveldb\"
                4⤵
                  PID:1764
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Program Files (x86)\Steam\"
                  4⤵
                    PID:2972
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c 2>NUL dir /b "C:\Program Files\Steam\"
                    4⤵
                      PID:2144
                    • C:\Windows\system32\timeout.exe
                      timeout /t 2 /nobreak
                      4⤵
                      • Delays execution with timeout.exe
                      PID:2944

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                Filesize

                7KB

                MD5

                a6b03e54313eceb5bd91629e5b74740c

                SHA1

                e78ef72e2e0c13ce30de6dbdf6bf0ea4ed65af13

                SHA256

                fccdf715f512a876fa02e54527bb8dddd00ec06be2e58311e76060ecf7c4b3e5

                SHA512

                f5d98ea4eb708234804495acf2cdd62ab4eeecac7a9abe989f051959cc8483317375be712cdbe03c7112868cb817d87bdc88d63dd1724ce8a1e4af3e52e952d4

              • memory/2668-18-0x000000001B760000-0x000000001BA42000-memory.dmp

                Filesize

                2.9MB

              • memory/2668-24-0x000000000295B000-0x00000000029C2000-memory.dmp

                Filesize

                412KB

              • memory/2668-25-0x000007FEF5200000-0x000007FEF5B9D000-memory.dmp

                Filesize

                9.6MB

              • memory/2668-26-0x000007FEF5200000-0x000007FEF5B9D000-memory.dmp

                Filesize

                9.6MB

              • memory/2668-23-0x0000000002950000-0x00000000029D0000-memory.dmp

                Filesize

                512KB

              • memory/2668-22-0x0000000002950000-0x00000000029D0000-memory.dmp

                Filesize

                512KB

              • memory/2668-21-0x0000000002950000-0x00000000029D0000-memory.dmp

                Filesize

                512KB

              • memory/2668-19-0x0000000002810000-0x0000000002818000-memory.dmp

                Filesize

                32KB

              • memory/2668-20-0x000007FEF5200000-0x000007FEF5B9D000-memory.dmp

                Filesize

                9.6MB

              • memory/2824-8-0x000007FEF5BA0000-0x000007FEF653D000-memory.dmp

                Filesize

                9.6MB

              • memory/2824-12-0x000007FEF5BA0000-0x000007FEF653D000-memory.dmp

                Filesize

                9.6MB

              • memory/2824-11-0x0000000002B70000-0x0000000002BF0000-memory.dmp

                Filesize

                512KB

              • memory/2824-10-0x0000000002B70000-0x0000000002BF0000-memory.dmp

                Filesize

                512KB

              • memory/2824-9-0x0000000002B70000-0x0000000002BF0000-memory.dmp

                Filesize

                512KB

              • memory/2824-4-0x000007FEF5BA0000-0x000007FEF653D000-memory.dmp

                Filesize

                9.6MB

              • memory/2824-7-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

                Filesize

                32KB

              • memory/2824-5-0x0000000002B70000-0x0000000002BF0000-memory.dmp

                Filesize

                512KB

              • memory/2824-6-0x000000001B740000-0x000000001BA22000-memory.dmp

                Filesize

                2.9MB