Analysis

  • max time kernel
    127s
  • max time network
    132s
  • platform
    windows10-1703_x64
  • resource
    win10-20240319-en
  • resource tags

    arch:x64arch:x86image:win10-20240319-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/04/2024, 11:02

General

  • Target

    Infinitycrash.bat

  • Size

    363B

  • MD5

    b31cb5cb824da4d9b935fa908d002b34

  • SHA1

    0e743230273dd0390dc9f3f0b59f4a64c88bccd0

  • SHA256

    2d3350d5efeed9d0f2d50ea39fdc4824cfc452594aaa621d730249ca65ded1f3

  • SHA512

    16d668b73e49c11e321de2b5d0a9f50d0da59268f909d44df5573f06494a1f9f27c6d2f7c72b07e8bd7cc2e606aa5df8966a5fb438ec0bb647a234272f74a174

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 39 IoCs
  • Suspicious use of SendNotifyMessage 39 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Views/modifies file attributes 1 TTPs 4 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Infinitycrash.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2852
    • C:\Windows\system32\attrib.exe
      attrib -r -s -h c:autoexec.bat
      2⤵
      • Views/modifies file attributes
      PID:392
    • C:\Windows\system32\attrib.exe
      attrib -r -s -h c:boot.ini
      2⤵
      • Views/modifies file attributes
      PID:1436
    • C:\Windows\system32\attrib.exe
      attrib -r -s -h c:ntldr
      2⤵
      • Views/modifies file attributes
      PID:2920
    • C:\Windows\system32\attrib.exe
      attrib -r -s -h c:windowswin.ini
      2⤵
      • Views/modifies file attributes
      PID:208
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x3e8
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4104
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s DeviceAssociationService
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4464
    • C:\Windows\system32\dashost.exe
      dashost.exe {ae46e400-f4ea-4b0d-8b7bf0ace4f7882d}
      2⤵
        PID:3368
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Drops file in Windows directory
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1644

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads