Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/03/2024, 15:29
Static task
static1
Behavioral task
behavioral1
Sample
onliner.zip
Resource
win11-20240221-en
Behavioral task
behavioral2
Sample
FiddlerPatcher.exe
Resource
win11-20240221-en
Behavioral task
behavioral3
Sample
data/config.json
Resource
win11-20240221-en
Behavioral task
behavioral4
Sample
data/custom status.txt
Resource
win11-20240221-en
Behavioral task
behavioral5
Sample
data/spotify songs.json
Resource
win11-20240221-en
Behavioral task
behavioral6
Sample
onliner.exe
Resource
win11-20240221-en
Behavioral task
behavioral7
Sample
start.bat
Resource
win11-20240221-en
General
-
Target
start.bat
-
Size
1KB
-
MD5
5180b7e0a3f349b35912c3e5345eb3c1
-
SHA1
20a27319d03c0977b56d8e605417d2472c8cd1e6
-
SHA256
59aa146a7b0a08cf3f703d24725c8c5524fc5264118f6fbfb38fcb3f257eeecb
-
SHA512
88afbd6914dc3ff4afb74b04ae0c5d613c2f666077ae2da1df38322739561449b524341856e017bfafc973f3dc1274a3581e4273675ecc7b51ad14661b2bc7eb
Malware Config
Signatures
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2284 PING.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 5008 powershell.exe 5008 powershell.exe 3516 FiddlerPatcher.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5008 powershell.exe Token: SeDebugPrivilege 3516 FiddlerPatcher.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2284 1488 cmd.exe 81 PID 1488 wrote to memory of 2284 1488 cmd.exe 81 PID 1488 wrote to memory of 3516 1488 cmd.exe 82 PID 1488 wrote to memory of 3516 1488 cmd.exe 82 PID 1488 wrote to memory of 3516 1488 cmd.exe 82 PID 1488 wrote to memory of 5008 1488 cmd.exe 83 PID 1488 wrote to memory of 5008 1488 cmd.exe 83 PID 5008 wrote to memory of 4476 5008 powershell.exe 85 PID 5008 wrote to memory of 4476 5008 powershell.exe 85
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\start.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\system32\PING.EXEping localhost -n 32⤵
- Runs ping.exe
PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\FiddlerPatcher.exeFiddlerPatcher.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -encodedCommand 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⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\onliner.exe"C:\Users\Admin\AppData\Local\Temp\onliner.exe"3⤵PID:4476
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82