Resubmissions

17/05/2024, 16:51

240517-vcye4shc4t 8

17/05/2024, 16:43

240517-t8jq6aha41 6

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/05/2024, 16:43

General

  • Target

    IDM.cmd

  • Size

    30KB

  • MD5

    54c20ccf4325f87a0205bc0702db3ced

  • SHA1

    30d782669eaa7826d27c57afb986171cdb1ae8fb

  • SHA256

    30555d42a87b7e9c4385b8e4bee472676af2bc61f00be0c2efa4e8e9693b10a3

  • SHA512

    3e69891ba4fe944c721929aee6d0907b51ade19e69c947b91616083e8c73386f5f14b486ceeed784a9a4c1c31af48044d9de04607b4d1a47124b24abc63b1711

  • SSDEEP

    192:ZWphSAHP0lwUdHa3piIdKYHoir/DHBQFCovdlDKgPW96/Lb6942o1hgAtDBbY7YY:Ypho63piIewQFH/Zbjl7+qK14TEJYab

Score
4/10

Malware Config

Signatures

  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies registry class 3 IoCs
  • Modifies registry key 1 TTPs 7 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\IDM.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Windows\System32\sc.exe
      sc query Null
      2⤵
      • Launches sc.exe
      PID:1200
    • C:\Windows\System32\find.exe
      find /i "RUNNING"
      2⤵
        PID:1588
      • C:\Windows\System32\findstr.exe
        findstr /v "$" "IDM.cmd"
        2⤵
          PID:3564
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ver
          2⤵
            PID:4256
          • C:\Windows\System32\reg.exe
            reg query "HKCU\Console" /v ForceV2
            2⤵
              PID:1408
            • C:\Windows\System32\find.exe
              find /i "0x0"
              2⤵
                PID:668
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c echo prompt $E | cmd
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:428
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo prompt $E "
                  3⤵
                    PID:1040
                  • C:\Windows\System32\cmd.exe
                    cmd
                    3⤵
                      PID:1676
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\Admin\AppData\Local\Temp\IDM.cmd" "
                    2⤵
                      PID:372
                    • C:\Windows\System32\find.exe
                      find /i "C:\Users\Admin\AppData\Local\Temp"
                      2⤵
                        PID:528
                      • C:\Windows\System32\fltMC.exe
                        fltmc
                        2⤵
                          PID:4428
                        • C:\Windows\System32\reg.exe
                          reg query HKCU\Console /v QuickEdit
                          2⤵
                          • Modifies registry key
                          PID:4024
                        • C:\Windows\System32\find.exe
                          find /i "0x0"
                          2⤵
                            PID:3224
                          • C:\Windows\System32\reg.exe
                            reg add HKCU\Console /v QuickEdit /t REG_DWORD /d "0" /f
                            2⤵
                            • Modifies registry key
                            PID:1324
                          • C:\Windows\System32\cmd.exe
                            cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IDM.cmd" -qedit"
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2408
                            • C:\Windows\System32\reg.exe
                              reg add HKCU\Console /v QuickEdit /t REG_DWORD /d "1" /f
                              3⤵
                              • Modifies registry key
                              PID:1916
                            • C:\Windows\System32\sc.exe
                              sc query Null
                              3⤵
                              • Launches sc.exe
                              PID:4624
                            • C:\Windows\System32\find.exe
                              find /i "RUNNING"
                              3⤵
                                PID:2436
                              • C:\Windows\System32\findstr.exe
                                findstr /v "$" "IDM.cmd"
                                3⤵
                                  PID:4252
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c ver
                                  3⤵
                                    PID:2616
                                  • C:\Windows\System32\reg.exe
                                    reg query "HKCU\Console" /v ForceV2
                                    3⤵
                                      PID:4724
                                    • C:\Windows\System32\find.exe
                                      find /i "0x0"
                                      3⤵
                                        PID:5096
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c echo prompt $E | cmd
                                        3⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:1052
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" echo prompt $E "
                                          4⤵
                                            PID:4084
                                          • C:\Windows\System32\cmd.exe
                                            cmd
                                            4⤵
                                              PID:2104
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\Admin\AppData\Local\Temp\IDM.cmd" "
                                            3⤵
                                              PID:2956
                                            • C:\Windows\System32\find.exe
                                              find /i "C:\Users\Admin\AppData\Local\Temp"
                                              3⤵
                                                PID:4920
                                              • C:\Windows\System32\fltMC.exe
                                                fltmc
                                                3⤵
                                                  PID:4164
                                                • C:\Windows\System32\reg.exe
                                                  reg query HKCU\Console /v QuickEdit
                                                  3⤵
                                                  • Modifies registry key
                                                  PID:3808
                                                • C:\Windows\System32\find.exe
                                                  find /i "0x0"
                                                  3⤵
                                                    PID:2332
                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                    powershell.exe "(Get-Process | Where-Object { $_.MainWindowTitle -like '*TermTest-27088*' }).ProcessName"
                                                    3⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2360
                                                  • C:\Windows\System32\find.exe
                                                    find /i "cmd"
                                                    3⤵
                                                      PID:396
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ping -4 -n 1 iasupdatecheck.massgrave.dev
                                                      3⤵
                                                        PID:5088
                                                        • C:\Windows\System32\PING.EXE
                                                          ping -4 -n 1 iasupdatecheck.massgrave.dev
                                                          4⤵
                                                          • Runs ping.exe
                                                          PID:4348
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell.exe $ExecutionContext.SessionState.LanguageMode
                                                        3⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:636
                                                      • C:\Windows\System32\find.exe
                                                        find /i "Full"
                                                        3⤵
                                                          PID:4136
                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          powershell.exe "Get-WmiObject -Class Win32_ComputerSystem | Select-Object -Property CreationClassName"
                                                          3⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:1800
                                                        • C:\Windows\System32\find.exe
                                                          find /i "computersystem"
                                                          3⤵
                                                            PID:2136
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c powershell.exe "$explorerProc = Get-Process -Name explorer | Where-Object {$_.SessionId -eq (Get-Process -Id $pid).SessionId} | Select-Object -First 1; $sid = (gwmi -Query ('Select * From Win32_Process Where ProcessID=' + $explorerProc.Id)).GetOwnerSid().Sid; $sid" 2>nul
                                                            3⤵
                                                              PID:2740
                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell.exe "$explorerProc = Get-Process -Name explorer | Where-Object {$_.SessionId -eq (Get-Process -Id $pid).SessionId} | Select-Object -First 1; $sid = (gwmi -Query ('Select * From Win32_Process Where ProcessID=' + $explorerProc.Id)).GetOwnerSid().Sid; $sid"
                                                                4⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:3752
                                                            • C:\Windows\System32\reg.exe
                                                              reg query HKU\S-1-5-21-711569230-3659488422-571408806-1000\Software\Classes
                                                              3⤵
                                                                PID:2712
                                                              • C:\Windows\System32\reg.exe
                                                                reg delete HKCU\IAS_TEST /f
                                                                3⤵
                                                                • Modifies registry key
                                                                PID:3868
                                                              • C:\Windows\System32\reg.exe
                                                                reg delete HKU\S-1-5-21-711569230-3659488422-571408806-1000\IAS_TEST /f
                                                                3⤵
                                                                  PID:5000
                                                                • C:\Windows\System32\reg.exe
                                                                  reg add HKCU\IAS_TEST
                                                                  3⤵
                                                                  • Modifies registry key
                                                                  PID:4504
                                                                • C:\Windows\System32\reg.exe
                                                                  reg query HKU\S-1-5-21-711569230-3659488422-571408806-1000\IAS_TEST
                                                                  3⤵
                                                                    PID:1796
                                                                  • C:\Windows\System32\reg.exe
                                                                    reg delete HKCU\IAS_TEST /f
                                                                    3⤵
                                                                    • Modifies registry key
                                                                    PID:3800
                                                                  • C:\Windows\System32\reg.exe
                                                                    reg delete HKU\S-1-5-21-711569230-3659488422-571408806-1000\IAS_TEST /f
                                                                    3⤵
                                                                      PID:4344
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c reg query "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment" /v PROCESSOR_ARCHITECTURE
                                                                      3⤵
                                                                        PID:4052
                                                                        • C:\Windows\System32\reg.exe
                                                                          reg query "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\Environment" /v PROCESSOR_ARCHITECTURE
                                                                          4⤵
                                                                            PID:1932
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c reg query "HKU\S-1-5-21-711569230-3659488422-571408806-1000\Software\DownloadManager" /v ExePath 2>nul
                                                                          3⤵
                                                                            PID:4632
                                                                            • C:\Windows\System32\reg.exe
                                                                              reg query "HKU\S-1-5-21-711569230-3659488422-571408806-1000\Software\DownloadManager" /v ExePath
                                                                              4⤵
                                                                                PID:336
                                                                            • C:\Windows\System32\reg.exe
                                                                              reg add HKU\S-1-5-21-711569230-3659488422-571408806-1000\Software\Classes\Wow6432Node\CLSID\IAS_TEST
                                                                              3⤵
                                                                              • Modifies registry class
                                                                              PID:1580
                                                                            • C:\Windows\System32\reg.exe
                                                                              reg query HKU\S-1-5-21-711569230-3659488422-571408806-1000\Software\Classes\Wow6432Node\CLSID\IAS_TEST
                                                                              3⤵
                                                                                PID:4832
                                                                              • C:\Windows\System32\reg.exe
                                                                                reg delete HKU\S-1-5-21-711569230-3659488422-571408806-1000\Software\Classes\Wow6432Node\CLSID\IAS_TEST /f
                                                                                3⤵
                                                                                • Modifies registry class
                                                                                PID:1408
                                                                              • C:\Windows\System32\mode.com
                                                                                mode 75, 28
                                                                                3⤵
                                                                                  PID:2036
                                                                                • C:\Windows\System32\choice.exe
                                                                                  choice /C:12340 /N
                                                                                  3⤵
                                                                                    PID:3308

                                                                              Network

                                                                              MITRE ATT&CK Enterprise v15

                                                                              Replay Monitor

                                                                              Loading Replay Monitor...

                                                                              Downloads

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                Filesize

                                                                                2KB

                                                                                MD5

                                                                                6cf293cb4d80be23433eecf74ddb5503

                                                                                SHA1

                                                                                24fe4752df102c2ef492954d6b046cb5512ad408

                                                                                SHA256

                                                                                b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8

                                                                                SHA512

                                                                                0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                Filesize

                                                                                64B

                                                                                MD5

                                                                                50a8221b93fbd2628ac460dd408a9fc1

                                                                                SHA1

                                                                                7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

                                                                                SHA256

                                                                                46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

                                                                                SHA512

                                                                                27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                Filesize

                                                                                64B

                                                                                MD5

                                                                                446dd1cf97eaba21cf14d03aebc79f27

                                                                                SHA1

                                                                                36e4cc7367e0c7b40f4a8ace272941ea46373799

                                                                                SHA256

                                                                                a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf

                                                                                SHA512

                                                                                a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                Filesize

                                                                                1KB

                                                                                MD5

                                                                                c5ccf1073b08f4336ce2174ab09d546a

                                                                                SHA1

                                                                                a61fbd4cb3e1a2a4598ef4ce0d045ec017cfee0f

                                                                                SHA256

                                                                                17123036a5782d9c2e4372a631fc009ba3defe97847b0b6c56654147fad2ccde

                                                                                SHA512

                                                                                cb14979e86c3e7fe4f1c26e55b11185e4cf4464025cb1f7a64873d835dd85148f273611e9960a944e587a670852d7fb6240aaf4f76f5d43bf5e10e2b36429a7a

                                                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wo33uvba.lwd.ps1

                                                                                Filesize

                                                                                60B

                                                                                MD5

                                                                                d17fe0a3f47be24a6453e9ef58c94641

                                                                                SHA1

                                                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                SHA256

                                                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                SHA512

                                                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                              • memory/2360-9-0x00000182AA3F0000-0x00000182AA412000-memory.dmp

                                                                                Filesize

                                                                                136KB

                                                                              • memory/2360-12-0x00000182AA0D0000-0x00000182AA2EC000-memory.dmp

                                                                                Filesize

                                                                                2.1MB