Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 12:01
Static task
static1
Behavioral task
behavioral1
Sample
12.bat
Resource
win7-20240221-en
General
-
Target
12.bat
-
Size
968B
-
MD5
9aa2d6dc655ed5dc4d3fa02879a6e593
-
SHA1
40d2c08d452632eef96fd900b84589e07c896c3a
-
SHA256
466bf6d31065714ac4cfbaff1cd6cdb34831047082a85767a887284f20153f4b
-
SHA512
84bacb6352c1826133f4a8d727d331fcefb9cc30ecf3a910b66e183f68106b536127cce00c202b604840d5416e16526beb961627cb5c0fe55c675434208b72b3
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1204 powershell.exe 2616 powershell.exe 2868 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1204 powershell.exe Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 2868 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1204 2240 cmd.exe 29 PID 2240 wrote to memory of 1204 2240 cmd.exe 29 PID 2240 wrote to memory of 1204 2240 cmd.exe 29 PID 2240 wrote to memory of 2596 2240 cmd.exe 30 PID 2240 wrote to memory of 2596 2240 cmd.exe 30 PID 2240 wrote to memory of 2596 2240 cmd.exe 30 PID 2596 wrote to memory of 2616 2596 cmd.exe 31 PID 2596 wrote to memory of 2616 2596 cmd.exe 31 PID 2596 wrote to memory of 2616 2596 cmd.exe 31 PID 2240 wrote to memory of 2868 2240 cmd.exe 32 PID 2240 wrote to memory of 2868 2240 cmd.exe 32 PID 2240 wrote to memory of 2868 2240 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\12.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Write-Host"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -Command "Add-Type -TypeDefinition 'using System; using System.Windows.Forms; [System.Windows.Forms.Cursor]::Position = New-Object System.Drawing.Point((Get-Random -Minimum 0 -Maximum [System.Windows.Forms.Screen]::PrimaryScreen.Bounds.Width), (Get-Random -Minimum 0 -Maximum [System.Windows.Forms.Screen]::PrimaryScreen.Bounds.Height)); Write-Output ([System.Windows.Forms.Cursor]::Position.X) ([System.Windows.Forms.Cursor]::Position.Y)"2⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-Type -TypeDefinition 'using System; using System.Windows.Forms; [System.Windows.Forms.Cursor]::Position = New-Object System.Drawing.Point((Get-Random -Minimum 0 -Maximum [System.Windows.Forms.Screen]::PrimaryScreen.Bounds.Width), (Get-Random -Minimum 0 -Maximum [System.Windows.Forms.Screen]::PrimaryScreen.Bounds.Height)); Write-Output ([System.Windows.Forms.Cursor]::Position.X) ([System.Windows.Forms.Cursor]::Position.Y)"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "[System.Windows.Forms.Cursor]::Position = New-Object System.Drawing.Point($randomX, $randomY)"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\68QCCL1JHNOB4GRHS3C6.temp
Filesize7KB
MD52afd5480f03ec5b6a800dc7393326de5
SHA1315aa5f591877f88141ea2aa813a5551a70d22fc
SHA256e0364bf8f4ced4936f1f3a0e682211a233a2edb75f306f3be7d78cb94394cfe9
SHA512fff614e952cc5006703c76dfd3728c29f12bcb52fe46b68a67f5ae5c76578de2f2b05d17bb3584ea045bd5253f55a5e7a5da2f06837fa79418bd0645403f0df1