Analysis
-
max time kernel
135s -
max time network
138s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
18/03/2024, 14:40
Static task
static1
Behavioral task
behavioral1
Sample
Batlez Tweaks.bat
Resource
win10-20240221-en
General
-
Target
Batlez Tweaks.bat
-
Size
173KB
-
MD5
253e84d7b66dc7dc4922ea02958757a1
-
SHA1
384d054d833dcb36116f6c9257fbfb5fe47b843d
-
SHA256
5271bd7e9e74c25bbdc1e973b7fdad634a643942ad6171ab67587e4b850fee91
-
SHA512
91f13e643fa97a19d1c75b36802997057a7825379c2b2d05c83be27fd354d1a38e83d7699eaa442ed6464de5dad94628bd8008e5834b1f894087ca9a83e8b45b
-
SSDEEP
1536:xRlWO12I9CzhCCytht1MF+VWFUTUjU08o63b7H/UoiuU:r0zACytht1MF+VWSAwHjHBiP
Malware Config
Signatures
-
Delays execution with timeout.exe 1 IoCs
pid Process 768 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2852630833-2010812756-3750823755-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3104 vlc.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3188 powershell.exe 3188 powershell.exe 3188 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3104 vlc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3188 powershell.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 3104 vlc.exe 3104 vlc.exe 3104 vlc.exe 3104 vlc.exe 3104 vlc.exe 3104 vlc.exe 3104 vlc.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3104 vlc.exe 3104 vlc.exe 3104 vlc.exe 3104 vlc.exe 3104 vlc.exe 3104 vlc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3104 vlc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 708 wrote to memory of 3188 708 cmd.exe 74 PID 708 wrote to memory of 3188 708 cmd.exe 74 PID 3188 wrote to memory of 3588 3188 powershell.exe 75 PID 3188 wrote to memory of 3588 3188 powershell.exe 75 PID 3588 wrote to memory of 644 3588 cmd.exe 77 PID 3588 wrote to memory of 644 3588 cmd.exe 77 PID 3588 wrote to memory of 768 3588 cmd.exe 78 PID 3588 wrote to memory of 768 3588 cmd.exe 78 PID 3588 wrote to memory of 592 3588 cmd.exe 79 PID 3588 wrote to memory of 592 3588 cmd.exe 79 PID 3588 wrote to memory of 3192 3588 cmd.exe 80 PID 3588 wrote to memory of 3192 3588 cmd.exe 80 PID 3588 wrote to memory of 3200 3588 cmd.exe 81 PID 3588 wrote to memory of 3200 3588 cmd.exe 81
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Batlez Tweaks.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell start -verb runas '"C:\Users\Admin\AppData\Local\Temp\Batlez Tweaks.bat"' am_admin2⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Batlez Tweaks.bat" am_admin3⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\system32\chcp.comchcp 650014⤵PID:644
-
-
C:\Windows\system32\timeout.exetimeout /t 24⤵
- Delays execution with timeout.exe
PID:768
-
-
C:\Windows\system32\chcp.comchcp 4374⤵PID:592
-
-
C:\Windows\system32\chcp.comchcp 4374⤵PID:3192
-
-
C:\Windows\system32\chcp.comchcp 650014⤵PID:3200
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3112
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\ConfirmRegister.ram"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3104
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s fdPHost1⤵PID:4328
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a