Analysis

  • max time kernel
    1378s
  • max time network
    1167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-05-2024 13:20

General

  • Target

    deathiswarm.bat

  • Size

    2KB

  • MD5

    d83a3df80a4cdb43e3d77c3467085c7d

  • SHA1

    c3cf9142ef6b3fc7cdf436b8b9deaaabad52251a

  • SHA256

    a31a2c5f992a1feca2749614b83d50e45de6dc5d8656f249330d3ac892515294

  • SHA512

    7658cdaea27d4b2e10424558e39cb43e38d1c172bfc553cb75745261239ed7c6c12bf524aae7509c4f320caac206cbe9c28258279df6bd3490bf63014e1eed1a

Score
1/10

Malware Config

Signatures

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 51 IoCs
  • Suspicious use of SendNotifyMessage 51 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\deathiswarm.bat"
    1⤵
      PID:4988
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /7
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3432

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/3432-0-0x000001B309C30000-0x000001B309C31000-memory.dmp

      Filesize

      4KB

    • memory/3432-2-0x000001B309C30000-0x000001B309C31000-memory.dmp

      Filesize

      4KB

    • memory/3432-1-0x000001B309C30000-0x000001B309C31000-memory.dmp

      Filesize

      4KB

    • memory/3432-11-0x000001B309C30000-0x000001B309C31000-memory.dmp

      Filesize

      4KB

    • memory/3432-12-0x000001B309C30000-0x000001B309C31000-memory.dmp

      Filesize

      4KB

    • memory/3432-10-0x000001B309C30000-0x000001B309C31000-memory.dmp

      Filesize

      4KB

    • memory/3432-9-0x000001B309C30000-0x000001B309C31000-memory.dmp

      Filesize

      4KB

    • memory/3432-8-0x000001B309C30000-0x000001B309C31000-memory.dmp

      Filesize

      4KB

    • memory/3432-6-0x000001B309C30000-0x000001B309C31000-memory.dmp

      Filesize

      4KB

    • memory/3432-7-0x000001B309C30000-0x000001B309C31000-memory.dmp

      Filesize

      4KB