Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-03-2024 14:18
Static task
static1
Behavioral task
behavioral1
Sample
Bathrooms.bat
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
Bathrooms.bat
Resource
win10v2004-20240226-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Bathrooms.bat
-
Size
13KB
-
MD5
a0d9b89b48e8fc49b82d019ee8500484
-
SHA1
5ca4d2e68d734e2314bc226f0bd6b5c04e0bdac3
-
SHA256
f231fe2acf36b89ade78b80eb336650de0e4a7e9bfee25e70bce55a93c77e02a
-
SHA512
1ac26f3815f4477a1ba6e73fe90587952fda18dd4da2ccd201bb5a36eebbe76270ace8b5f8764e279568ed394e5bdcf9ee10a429ad6c76f9b462c37043034fe5
-
SSDEEP
192:TNpj6Hq+sRaY/G3R6RycS39f4Qb7dqHm0nL:TN43WG39fndk
Score
1/10
Malware Config
Signatures
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2008 tasklist.exe 2532 tasklist.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2648 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2008 tasklist.exe Token: SeDebugPrivilege 2532 tasklist.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2008 2948 cmd.exe 29 PID 2948 wrote to memory of 2008 2948 cmd.exe 29 PID 2948 wrote to memory of 2008 2948 cmd.exe 29 PID 2948 wrote to memory of 1992 2948 cmd.exe 30 PID 2948 wrote to memory of 1992 2948 cmd.exe 30 PID 2948 wrote to memory of 1992 2948 cmd.exe 30 PID 2948 wrote to memory of 2532 2948 cmd.exe 32 PID 2948 wrote to memory of 2532 2948 cmd.exe 32 PID 2948 wrote to memory of 2532 2948 cmd.exe 32 PID 2948 wrote to memory of 2100 2948 cmd.exe 33 PID 2948 wrote to memory of 2100 2948 cmd.exe 33 PID 2948 wrote to memory of 2100 2948 cmd.exe 33 PID 2948 wrote to memory of 2664 2948 cmd.exe 34 PID 2948 wrote to memory of 2664 2948 cmd.exe 34 PID 2948 wrote to memory of 2664 2948 cmd.exe 34 PID 2948 wrote to memory of 2684 2948 cmd.exe 35 PID 2948 wrote to memory of 2684 2948 cmd.exe 35 PID 2948 wrote to memory of 2684 2948 cmd.exe 35 PID 2948 wrote to memory of 2696 2948 cmd.exe 36 PID 2948 wrote to memory of 2696 2948 cmd.exe 36 PID 2948 wrote to memory of 2696 2948 cmd.exe 36 PID 2948 wrote to memory of 2648 2948 cmd.exe 37 PID 2948 wrote to memory of 2648 2948 cmd.exe 37 PID 2948 wrote to memory of 2648 2948 cmd.exe 37
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Bathrooms.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Windows\system32\findstr.exefindstr /I "wrsa.exe opssvc.exe"2⤵PID:1992
-
-
C:\Windows\system32\tasklist.exetasklist2⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Windows\system32\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"2⤵PID:2100
-
-
C:\Windows\system32\cmd.execmd /c md 19432⤵PID:2664
-
-
C:\Windows\system32\cmd.execmd /c copy /b Compound + Injection + Emotions + Worm + Participants + Richmond + Alot 1943\Enters.pif2⤵PID:2684
-
-
C:\Windows\system32\cmd.execmd /c copy /b Disco 1943\r2⤵PID:2696
-
-
C:\Windows\system32\PING.EXEping -n 5 127.0.0.12⤵
- Runs ping.exe
PID:2648
-