Analysis
-
max time kernel
92s -
max time network
80s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08-04-2024 14:40
Static task
static1
Behavioral task
behavioral1
Sample
a.bat
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
General
-
Target
a.bat
-
Size
2KB
-
MD5
dfa3eb0805822ef13b64bb7f6fbab9f8
-
SHA1
2576b69c81aeed4eabcf6c20925b7c3a5e56873e
-
SHA256
dc4eb66e46768286f75d7cec638c984c3d079a0af769e814939279f0d5dee416
-
SHA512
aeb21b654f3a9277cff0fb10da9273d6c1676dd14242e4e5e0497c663efd1264fb6959941634c2026dddcb48b0e7fbd8989ff7195c7108589214102c1842b2c7
Score
1/10
Malware Config
Signatures
-
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
-
Suspicious use of AdjustPrivilegeToken 40 IoCs
Processes:
WMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 2540 WMIC.exe Token: SeSecurityPrivilege 2540 WMIC.exe Token: SeTakeOwnershipPrivilege 2540 WMIC.exe Token: SeLoadDriverPrivilege 2540 WMIC.exe Token: SeSystemProfilePrivilege 2540 WMIC.exe Token: SeSystemtimePrivilege 2540 WMIC.exe Token: SeProfSingleProcessPrivilege 2540 WMIC.exe Token: SeIncBasePriorityPrivilege 2540 WMIC.exe Token: SeCreatePagefilePrivilege 2540 WMIC.exe Token: SeBackupPrivilege 2540 WMIC.exe Token: SeRestorePrivilege 2540 WMIC.exe Token: SeShutdownPrivilege 2540 WMIC.exe Token: SeDebugPrivilege 2540 WMIC.exe Token: SeSystemEnvironmentPrivilege 2540 WMIC.exe Token: SeRemoteShutdownPrivilege 2540 WMIC.exe Token: SeUndockPrivilege 2540 WMIC.exe Token: SeManageVolumePrivilege 2540 WMIC.exe Token: 33 2540 WMIC.exe Token: 34 2540 WMIC.exe Token: 35 2540 WMIC.exe Token: SeIncreaseQuotaPrivilege 2540 WMIC.exe Token: SeSecurityPrivilege 2540 WMIC.exe Token: SeTakeOwnershipPrivilege 2540 WMIC.exe Token: SeLoadDriverPrivilege 2540 WMIC.exe Token: SeSystemProfilePrivilege 2540 WMIC.exe Token: SeSystemtimePrivilege 2540 WMIC.exe Token: SeProfSingleProcessPrivilege 2540 WMIC.exe Token: SeIncBasePriorityPrivilege 2540 WMIC.exe Token: SeCreatePagefilePrivilege 2540 WMIC.exe Token: SeBackupPrivilege 2540 WMIC.exe Token: SeRestorePrivilege 2540 WMIC.exe Token: SeShutdownPrivilege 2540 WMIC.exe Token: SeDebugPrivilege 2540 WMIC.exe Token: SeSystemEnvironmentPrivilege 2540 WMIC.exe Token: SeRemoteShutdownPrivilege 2540 WMIC.exe Token: SeUndockPrivilege 2540 WMIC.exe Token: SeManageVolumePrivilege 2540 WMIC.exe Token: 33 2540 WMIC.exe Token: 34 2540 WMIC.exe Token: 35 2540 WMIC.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cmd.exedescription pid process target process PID 1624 wrote to memory of 2984 1624 cmd.exe systeminfo.exe PID 1624 wrote to memory of 2984 1624 cmd.exe systeminfo.exe PID 1624 wrote to memory of 2984 1624 cmd.exe systeminfo.exe PID 1624 wrote to memory of 2540 1624 cmd.exe WMIC.exe PID 1624 wrote to memory of 2540 1624 cmd.exe WMIC.exe PID 1624 wrote to memory of 2540 1624 cmd.exe WMIC.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
PID:2984
-
-
C:\Windows\System32\Wbem\WMIC.exewmic os get2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2540
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2732
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵PID:2380