Analysis

  • max time kernel
    69s
  • max time network
    74s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/05/2024, 01:35

General

  • Target

    SAMWARE/SAMWARE/SAMWARE/Serials_Checker.bat

  • Size

    862B

  • MD5

    70b7863d0ca809751200f9300cd21033

  • SHA1

    8f9fca90e24ec21c00b539b82256ed6cd9712ea8

  • SHA256

    ed63d2195825398b5523fcd9cd312b775c0fe3f4cc0472c9f06edeb8f32c325d

  • SHA512

    d5d7d05d5e1861b88ce660c9a2939a3a7891a1e70d65171b347908b8e1c9ece9223b487fddc34a1f100e8401d2d441b1488bb7728caab47075c90fc0448041b6

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\SAMWARE\SAMWARE\SAMWARE\Serials_Checker.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Windows\system32\mode.com
      mode con: cols=90 lines=48
      2⤵
        PID:1108
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic bios get serialnumber
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3132
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic csproduct get uuid
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3652
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic cpu get serialnumber
        2⤵
          PID:3196
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic cpu get processorid
          2⤵
            PID:1164
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic diskdrive get serialnumber
            2⤵
              PID:3204
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic baseboard get serialnumber
              2⤵
                PID:2224
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic memorychip get serialnumber
                2⤵
                  PID:3236
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic path Win32_NetworkAdapter where "PNPDeviceID like '%PCI%' AND NetConnectionStatus=2 AND AdapterTypeID='0'" get MacAddress
                  2⤵
                    PID:5100
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic PATH Win32_VideoController GET Description,PNPDeviceID
                    2⤵
                      PID:2188

                  Network

                        MITRE ATT&CK Matrix

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads