Analysis

  • max time kernel
    361s
  • max time network
    365s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    11-05-2024 11:50

General

  • Target

    tulipicalv1.bat

  • Size

    135B

  • MD5

    a5ec871d590f7aaa91f31900dafd7d85

  • SHA1

    6ca11d8a45399dab87e9b92c940e8d5f448a8bd3

  • SHA256

    d4b74666f41414973bff4c2dbfe7d05e3d414cc81ba007b23353393c1d7d5c22

  • SHA512

    f854d5e3146821434b1cb634910b1d8965a0b5fe0b371f1c0a888d570c5d018e52f9b1331b0503744e103944f905f0014a302208688e3230b74a52d3cd22fd4e

Score
1/10

Malware Config

Signatures

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 22 IoCs
  • Opens file in notepad (likely ransom note) 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\tulipicalv1.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Windows\system32\help.exe
      help
      2⤵
        PID:1752
      • C:\Windows\system32\ipconfig.exe
        ipconfig
        2⤵
        • Gathers network information
        PID:1536
      • C:\Windows\system32\help.exe
        help
        2⤵
          PID:2184
        • C:\Windows\system32\help.exe
          help
          2⤵
            PID:2432
        • C:\Windows\System32\NOTEPAD.EXE
          "C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ree.bat
          1⤵
          • Modifies registry class
          • Opens file in notepad (likely ransom note)
          • Suspicious use of SetWindowsHookEx
          PID:1540
        • C:\Windows\system32\cmd.exe
          cmd /c ""C:\Users\Admin\Desktop\ree.bat" "
          1⤵
            PID:2840
          • C:\Windows\System32\NOTEPAD.EXE
            "C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ree.bat
            1⤵
            • Opens file in notepad (likely ransom note)
            • Suspicious use of FindShellTrayWindow
            PID:2872
          • C:\Windows\system32\cmd.exe
            cmd /c ""C:\Users\Admin\Desktop\ree.bat" "
            1⤵
              PID:1676
            • C:\Windows\system32\cmd.exe
              cmd /c ""C:\Users\Admin\Desktop\ree.bat" "
              1⤵
                PID:1936
              • C:\Windows\System32\NOTEPAD.EXE
                "C:\Windows\System32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ree.bat
                1⤵
                • Opens file in notepad (likely ransom note)
                PID:1800
              • C:\Windows\system32\cmd.exe
                cmd /c ""C:\Users\Admin\Desktop\ree.bat" "
                1⤵
                  PID:1944
                • C:\Windows\system32\cmd.exe
                  cmd /c ""C:\Users\Admin\Desktop\ree.bat" "
                  1⤵
                    PID:1992
                  • C:\Windows\system32\cmd.exe
                    cmd /c ""C:\Users\Admin\Desktop\ree.bat" "
                    1⤵
                      PID:1060
                    • C:\Windows\system32\cmd.exe
                      cmd /c ""C:\Users\Admin\Desktop\ree.bat" "
                      1⤵
                        PID:764
                      • C:\Windows\system32\cmd.exe
                        cmd /c ""C:\Users\Admin\Desktop\ree.bat" "
                        1⤵
                          PID:812
                        • C:\Windows\system32\cmd.exe
                          cmd /c ""C:\Users\Admin\Desktop\ree.bat" "
                          1⤵
                            PID:2112
                          • C:\Windows\system32\cmd.exe
                            cmd /c ""C:\Users\Admin\Desktop\ree.bat" "
                            1⤵
                              PID:2168

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\Desktop\ree.bat

                              Filesize

                              31B

                              MD5

                              de5c4bb60e064b41300843ae182e0310

                              SHA1

                              0ab528af89aa36c8ace2f9611080ff291eb449f6

                              SHA256

                              15ae4efe79c2561dc02419e0698bee10449de8a97cff98cd9834c000f2e0047f

                              SHA512

                              d0e9e2536908955e63140733e50693d37ee5892b889d878c366c938b4cc07dbd0d39073824618388469c5ea73dd6bd5e076520d79d28e38b6644c6f58f76adf2

                            • C:\Users\Admin\Desktop\ree.bat

                              Filesize

                              35B

                              MD5

                              a83f0fcf63b6bbf4917a7b050dae721f

                              SHA1

                              f41ac3cd1d46770a530d99182f69107d9563b0b3

                              SHA256

                              c0b69846f1d9e8521541e41e935e0e4bc338fe351d6d047fcf7dd79354500ffa

                              SHA512

                              2a2fb5c8d834003a817b1c14fce5ce7a0319aade646f41da4d3ca9146282ac0b2032bc5e5d3533fbabb303171e45cb868fa4490ba03c53bcd0533dab823742cc

                            • memory/1540-0-0x0000000003C80000-0x0000000003C90000-memory.dmp

                              Filesize

                              64KB