Analysis
-
max time kernel
6s -
max time network
7s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
18/02/2024, 11:12
Static task
static1
Behavioral task
behavioral1
Sample
2419TROJAN.bat
Resource
win7-20240215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2419TROJAN.bat
Resource
win10v2004-20231222-en
5 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
2419TROJAN.bat
-
Size
792B
-
MD5
84fa9f86518c5d502474f72b1055bb89
-
SHA1
044cb9ad36505c084d3486a30e82d73177007079
-
SHA256
a104929f838b9dbab7369221b7d885312170851eba513176f4ad6db7332da1ca
-
SHA512
46e61b34bc2db3bf69d7780f0cf3626622d9b9903e22bd8d28f524f79412e948aa4293d466f0931647c031f1e2b0bef012c084700078feaf3c021722c6bd9f41
Score
1/10
Malware Config
Signatures
-
Modifies registry key 1 TTPs 2 IoCs
pid Process 2672 reg.exe 2796 reg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2328 shutdown.exe Token: SeRemoteShutdownPrivilege 2328 shutdown.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2796 2132 cmd.exe 29 PID 2132 wrote to memory of 2796 2132 cmd.exe 29 PID 2132 wrote to memory of 2796 2132 cmd.exe 29 PID 2132 wrote to memory of 2328 2132 cmd.exe 30 PID 2132 wrote to memory of 2328 2132 cmd.exe 30 PID 2132 wrote to memory of 2328 2132 cmd.exe 30 PID 2132 wrote to memory of 2812 2132 cmd.exe 32 PID 2132 wrote to memory of 2812 2132 cmd.exe 32 PID 2132 wrote to memory of 2812 2132 cmd.exe 32 PID 2132 wrote to memory of 2492 2132 cmd.exe 33 PID 2132 wrote to memory of 2492 2132 cmd.exe 33 PID 2132 wrote to memory of 2492 2132 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2419TROJAN.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\RestrictRun /v 1 /t REG_DWORD /d C:\Windows\explorer.exe /f2⤵
- Modifies registry key
PID:2796
-
-
C:\Windows\system32\shutdown.exeshutdown -r -t 1 -c "lol"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\system32\label.exelabel C: LAMER2⤵PID:2812
-
-
C:\Windows\system32\rundll32.exerundll32 mouse,disable2⤵PID:2492
-
-
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f2⤵
- Modifies registry key
PID:2672
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2600
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2624