Analysis
-
max time kernel
17s -
max time network
19s -
platform
windows11-21h2_x64 -
resource
win11-20240221-en -
resource tags
arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/03/2024, 15:11
Static task
static1
Behavioral task
behavioral1
Sample
main.bat
Resource
win11-20240221-en
7 signatures
600 seconds
Behavioral task
behavioral2
Sample
startup.bat
Resource
win11-20240221-en
4 signatures
600 seconds
Errors
Reason
Machine shutdown
General
-
Target
main.bat
-
Size
1KB
-
MD5
3d6b737f1ada3a484f4cd1312e13c834
-
SHA1
233b615c5436bf152e3fd8e91ee00b8ff4062ae3
-
SHA256
fb37f6514cefab934e854359ab4e72529d649ccd36f4135c8fb2061bb8dda328
-
SHA512
1499962165edf53325e837fae3cc4518ea3af7a0cae48b6d553d71677b5c0a6c4753666b62ceb89a9a63ade73461e108ab4fb3a2fb3ad21f6aad981356f3b837
Malware Config
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "26" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4192 reg.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 2080 shutdown.exe Token: SeRemoteShutdownPrivilege 2080 shutdown.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2772 LogonUI.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3852 wrote to memory of 3956 3852 cmd.exe 79 PID 3852 wrote to memory of 3956 3852 cmd.exe 79 PID 3956 wrote to memory of 4248 3956 net.exe 80 PID 3956 wrote to memory of 4248 3956 net.exe 80 PID 3852 wrote to memory of 4192 3852 cmd.exe 81 PID 3852 wrote to memory of 4192 3852 cmd.exe 81 PID 3852 wrote to memory of 2080 3852 cmd.exe 82 PID 3852 wrote to memory of 2080 3852 cmd.exe 82
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\main.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\system32\net.exeNET FILE2⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 FILE3⤵PID:4248
-
-
-
C:\Windows\system32\reg.exereg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f2⤵
- UAC bypass
- Modifies registry key
PID:4192
-
-
C:\Windows\system32\shutdown.exeshutdown /r -t 02⤵
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a07855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2772