Analysis
-
max time kernel
2214s -
max time network
1902s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-04-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
install.bat.ps1
Resource
win11-20240426-en
General
-
Target
install.bat.ps1
-
Size
1KB
-
MD5
e7051f6081a1fa4a803f9a10331646f4
-
SHA1
900bdbe8f397adf8b40e4ad29ee1931a817cf27f
-
SHA256
c0314ee94110588ffa54447d1c6a0fef38a42a59ad1fa28ec3c00cb5708c4518
-
SHA512
f3b62dd52e2d6f77d7e1a85f56f285adc8ea409c71ea34e0f09dea692bb61464cb20d56d79c005c2a216408a81eb21115231a2f4e5afeffeb7406edfda79e33c
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 3636 vlc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 4480 powershell.exe 4480 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
vlc.exepid process 3636 vlc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 4480 powershell.exe -
Suspicious use of FindShellTrayWindow 22 IoCs
Processes:
vlc.exepid process 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe -
Suspicious use of SendNotifyMessage 21 IoCs
Processes:
vlc.exepid process 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe 3636 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
MiniSearchHost.exevlc.exepid process 4832 MiniSearchHost.exe 3636 vlc.exe
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\install.bat.ps11⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:4832
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\SendBackup.mp3"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3636
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\SendBackup.mp3"1⤵PID:2188
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\SendBackup.mp3"1⤵PID:1508
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
76B
MD50d8c2610f5897d19ba1bb984d1522903
SHA1701bf6190d66be3d33f0ef30fa075827934bec72
SHA2561e2e4daf294ef4486c1a8d8cff89a6c96569e04249494f408dcaff2e6f04d8af
SHA5129e808ef330cce2ac18a0eacc745136f93c6844da0abd04ce565323f80110b50d87260c5ccd4a2f5bc0846ae4ca7dc8f505c2e251dbffb05c008ecb0c209f14b1
-
Filesize
94KB
MD57b37c4f352a44c8246bf685258f75045
SHA1817dacb245334f10de0297e69c98b4c9470f083e
SHA256ec45f6e952b43eddc214dba703cf7f31398f3c9f535aad37f42237c56b9b778e
SHA5121e8d675b3c6c9ba257b616da268cac7f1c7a9db12ffb831ed5f8d43c0887d711c197ebc9daf735e3da9a0355bf21c2b29a2fb38a46482a2c5c8cd5628fea4c02