Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
27-04-2024 01:59
Static task
static1
Behavioral task
behavioral1
Sample
bsod fix.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bsod fix.bat
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
u237cgatAh2.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
u237cgatAh2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
w11 fix.bat
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
w11 fix.bat
Resource
win10v2004-20240419-en
General
-
Target
w11 fix.bat
-
Size
507B
-
MD5
6fb44052dc5a85a097feeb91d7a81712
-
SHA1
29db33e6cf3286a6ba82af684ac535d42b43d257
-
SHA256
7ec1b31de3b0114c266df0b475c5c582a504c7c38f7127949df27f78a5d1c026
-
SHA512
ee9dbcc0a7340ec6fe968ba611f0849fd1b77b88cb5deaad4c6a516a417abaf14055021e949ca04fde979364f060504c911fede81b0c492b651ea1b3f246494a
Malware Config
Signatures
-
Modifies boot configuration data using bcdedit 1 TTPs 1 IoCs
-
Modifies registry key 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2516 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2516 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
cmd.exenet.exedescription pid process target process PID 1876 wrote to memory of 2504 1876 cmd.exe net.exe PID 1876 wrote to memory of 2504 1876 cmd.exe net.exe PID 1876 wrote to memory of 2504 1876 cmd.exe net.exe PID 2504 wrote to memory of 2900 2504 net.exe net1.exe PID 2504 wrote to memory of 2900 2504 net.exe net1.exe PID 2504 wrote to memory of 2900 2504 net.exe net1.exe PID 1876 wrote to memory of 2556 1876 cmd.exe bcdedit.exe PID 1876 wrote to memory of 2556 1876 cmd.exe bcdedit.exe PID 1876 wrote to memory of 2556 1876 cmd.exe bcdedit.exe PID 1876 wrote to memory of 2516 1876 cmd.exe powershell.exe PID 1876 wrote to memory of 2516 1876 cmd.exe powershell.exe PID 1876 wrote to memory of 2516 1876 cmd.exe powershell.exe PID 1876 wrote to memory of 2692 1876 cmd.exe reg.exe PID 1876 wrote to memory of 2692 1876 cmd.exe reg.exe PID 1876 wrote to memory of 2692 1876 cmd.exe reg.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\w11 fix.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵
-
C:\Windows\system32\bcdedit.exebcdedit /set hypervisorlaunchtype off2⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -Command "Disable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V-All"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\reg.exereg add HKLM\SYSTEM\CurrentControlSet\Control\CI\Config /v VulnerableDriverBlocklistEnable /t REG_DWORD /d 0x0000002⤵
- Modifies registry key
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2516-4-0x000000001B700000-0x000000001B9E2000-memory.dmpFilesize
2.9MB
-
memory/2516-5-0x0000000001F70000-0x0000000001F78000-memory.dmpFilesize
32KB
-
memory/2516-6-0x000007FEF5DA0000-0x000007FEF673D000-memory.dmpFilesize
9.6MB
-
memory/2516-7-0x0000000002EA0000-0x0000000002F20000-memory.dmpFilesize
512KB
-
memory/2516-11-0x0000000002EA0000-0x0000000002F20000-memory.dmpFilesize
512KB
-
memory/2516-10-0x0000000002EA0000-0x0000000002F20000-memory.dmpFilesize
512KB
-
memory/2516-9-0x0000000002EA0000-0x0000000002F20000-memory.dmpFilesize
512KB
-
memory/2516-8-0x000007FEF5DA0000-0x000007FEF673D000-memory.dmpFilesize
9.6MB
-
memory/2516-12-0x000007FEF5DA0000-0x000007FEF673D000-memory.dmpFilesize
9.6MB