Resubmissions
04-05-2024 12:54
240504-p5fg4see7w 1Analysis
-
max time kernel
100s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 12:54
Static task
static1
Behavioral task
behavioral1
Sample
Iloveyou.bat
Resource
win7-20240221-en
windows7-x64
6 signatures
1800 seconds
Behavioral task
behavioral2
Sample
Iloveyou.bat
Resource
win10v2004-20240419-en
windows10-2004-x64
2 signatures
1800 seconds
General
-
Target
Iloveyou.bat
-
Size
329B
-
MD5
63705f835930c2b36ab47116e36b4065
-
SHA1
7fa737ddf3fffcd5443a08be5cf4f3d76d421a47
-
SHA256
e2cfcec5683907474c81bca42aa9c8b524e6d6a5108be7358122aef30012e804
-
SHA512
d2648d4a1f1b37cf7cb14436ba7f45451bf980463e8ba6cb34750a53965a5d1001e0abdcde400b293ac3a3c3d796ff7d59e7b541df84a667a48403446306d8df
Score
1/10
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 5016 shutdown.exe Token: SeRemoteShutdownPrivilege 5016 shutdown.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1912 wrote to memory of 5016 1912 cmd.exe 108 PID 1912 wrote to memory of 5016 1912 cmd.exe 108