Overview
overview
3Static
static
3AutoHotkey
windows7-x64
1AutoHotkey
windows10-2004-x64
1AutoHotkey.exe
windows7-x64
1AutoHotkey.exe
windows10-2004-x64
1Execute.txt
windows7-x64
1Execute.txt
windows10-2004-x64
1Gettype.txt
windows7-x64
1Gettype.txt
windows10-2004-x64
1Invoke.txt
windows7-x64
1Invoke.txt
windows10-2004-x64
1NewPE2.txt
windows7-x64
1NewPE2.txt
windows10-2004-x64
1SMOSA.vbs
windows7-x64
3SMOSA.vbs
windows10-2004-x64
3getMethod.txt
windows7-x64
1getMethod.txt
windows10-2004-x64
1load.txt
windows7-x64
1load.txt
windows10-2004-x64
1msg.txt
windows7-x64
1msg.txt
windows10-2004-x64
1node.bat
windows7-x64
3node.bat
windows10-2004-x64
3run.js
windows7-x64
3run.js
windows10-2004-x64
3runpe.txt
windows7-x64
1runpe.txt
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
16/05/2024, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
AutoHotkey
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
AutoHotkey
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
AutoHotkey.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
AutoHotkey.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
Execute.txt
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
Execute.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Gettype.txt
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
Gettype.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Invoke.txt
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Invoke.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
NewPE2.txt
Resource
win7-20240220-en
Behavioral task
behavioral12
Sample
NewPE2.txt
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
SMOSA.vbs
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
SMOSA.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
getMethod.txt
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
getMethod.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
load.txt
Resource
win7-20240220-en
Behavioral task
behavioral18
Sample
load.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
msg.txt
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
msg.txt
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
node.bat
Resource
win7-20240508-en
Behavioral task
behavioral22
Sample
node.bat
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
run.js
Resource
win7-20240419-en
Behavioral task
behavioral24
Sample
run.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
runpe.txt
Resource
win7-20240508-en
Behavioral task
behavioral26
Sample
runpe.txt
Resource
win10v2004-20240508-en
General
-
Target
node.bat
-
Size
687B
-
MD5
52dc8ab7250ca32c7dea8867d6464e5b
-
SHA1
4e3202f42632fa8a2c1c632af80b8223b9ada385
-
SHA256
b99b7a8864e07ed15ba3e11ec6e5ad793d3a8e257321c89c7c2b7842cc674728
-
SHA512
f43a7fc7e9d57f46eb08a8d84dde6503b5fd65c1f2e4a28f80ca700ca2050506c05b09ad52e092c6b46f094a079580bbd863cf04ff0ea3db589d2527218ef985
Malware Config
Signatures
-
pid Process 1252 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1252 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1252 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1720 wrote to memory of 1252 1720 cmd.exe 29 PID 1720 wrote to memory of 1252 1720 cmd.exe 29 PID 1720 wrote to memory of 1252 1720 cmd.exe 29 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\node.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "$tr = New-Object -ComObject Schedule.Service; $tr.Connect(); $ta = $tr.NewTask(0); $ta.RegistrationInfo.Description = 'Runs a script every 2 minutes'; $ta.Settings.Enabled = $true; $ta.Settings.DisallowStartIfOnBatteries = $false; $st = $ta.Triggers.Create(1); $st.StartBoundary = [DateTime]::Now.ToString('yyyy-MM-ddTHH:mm:ss'); $st.Repetition.Interval = 'PT2M'; $md = $ta.Actions.Create(0); $md.Path = 'C:\\Users\\Public\\AutoHotkey.exe'; $ns = $tr.GetFolder('\'); $ns.RegisterTaskDefinition('BTime', $ta, 6, $null, $null, 3);"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {45FD5EF0-00C8-45D2-8481-8C69FA97BCD2} S-1-5-21-2737914667-933161113-3798636211-1000:PUMARTNR\Admin:Interactive:[1]1⤵PID:2404