Analysis

  • max time kernel
    54s
  • max time network
    67s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/02/2024, 18:39

General

  • Target

    MAS/Separate-Files-Version/Troubleshoot.cmd

  • Size

    42KB

  • MD5

    2d877ef8736f2023e6431cbf8b8c6e0c

  • SHA1

    23d28dbdeda0dc6cfc6b59549b512b2d0ed6574d

  • SHA256

    2ed0c5f3b399618f3e54d47e2028583fa3e456346395cc90027cb817b1143fd4

  • SHA512

    a5af924d61518ad97e4ed7c6bcb6d8acdaf6644fa4dac538cfa23ed790ebaeba4dc06818605276f2c7c1e60017d77cf4692b3b389bbda1dad077ed29a954389d

  • SSDEEP

    768:KYZi6jI+By2jDDBWr7ntf7BhI3XBlOLq4ZnrsxpjN:KD+ByCsFVhI3XC7A

Score
4/10

Malware Config

Signatures

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MAS\Separate-Files-Version\Troubleshoot.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Windows\System32\findstr.exe
      findstr /v "$" "Troubleshoot.cmd"
      2⤵
        PID:220
      • C:\Windows\System32\find.exe
        find /i "RUNNING"
        2⤵
          PID:4272
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c echo prompt $E | cmd
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4784
          • C:\Windows\System32\cmd.exe
            cmd
            3⤵
              PID:5040
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo prompt $E "
              3⤵
                PID:1976
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\Admin\AppData\Local\Temp\MAS\Separate-Files-Version\Troubleshoot.cmd" "
              2⤵
                PID:5084
              • C:\Windows\System32\find.exe
                find /i "C:\Users\Admin\AppData\Local\Temp"
                2⤵
                  PID:4804
                • C:\Windows\System32\find.exe
                  find /i "0x0"
                  2⤵
                    PID:2532
                  • C:\Windows\System32\reg.exe
                    reg query "HKCU\Console" /v ForceV2
                    2⤵
                      PID:4020
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c ver
                      2⤵
                        PID:1220
                      • C:\Windows\System32\sc.exe
                        sc query Null
                        2⤵
                        • Launches sc.exe
                        PID:4548

                    Network

                    MITRE ATT&CK Matrix

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads