Overview
overview
9Static
static
7988f5cc56c...4f.exe
windows7-x64
9988f5cc56c...4f.exe
windows10-2004-x64
9$DESKTOP/�...��.bat
windows7-x64
1$DESKTOP/�...��.bat
windows10-2004-x64
1$PLUGINSDI...el.dll
windows7-x64
7$PLUGINSDI...el.dll
windows10-2004-x64
7$PLUGINSDI...tp.dll
windows7-x64
1$PLUGINSDI...tp.dll
windows10-2004-x64
1TigerHwidTool.exe
windows7-x64
9TigerHwidTool.exe
windows10-2004-x64
9spiderman.bat
windows7-x64
8spiderman.bat
windows10-2004-x64
8Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 16:20
Behavioral task
behavioral1
Sample
988f5cc56caf26115f78a50166cac0dd7724d11a2501f04bafc263d57b86e34f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
988f5cc56caf26115f78a50166cac0dd7724d11a2501f04bafc263d57b86e34f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
$DESKTOP/查看机器码.bat
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$DESKTOP/查看机器码.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/SelfDel.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/rfshdktp.dll
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/rfshdktp.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
TigerHwidTool.exe
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
TigerHwidTool.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
spiderman.bat
Resource
win7-20240419-en
Behavioral task
behavioral12
Sample
spiderman.bat
Resource
win10v2004-20240508-en
General
-
Target
$DESKTOP/查看机器码.bat
-
Size
1KB
-
MD5
4a027f0c86eb9614e81af680b2475499
-
SHA1
ca79f5c7789ffd01af9c00d20f15b1077e55fc15
-
SHA256
6c198b42a0c464d602a4e1a46a7ec19cf2f635ae2b2de3c566f2c1bd57e7d050
-
SHA512
169190d40a3d177c51bd4033d6dd543c8170fa8d3ee343a61de3f7803afce472473e712f60bacd4f82c51e24fe01e2936eb7309f22b896bd35f985b272200c01
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 4 IoCs
Processes:
reg.exereg.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer reg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct reg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS reg.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 4540 ipconfig.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1772 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
taskkill.exeWMIC.exeWMIC.exedescription pid process Token: SeDebugPrivilege 1772 taskkill.exe Token: SeIncreaseQuotaPrivilege 4744 WMIC.exe Token: SeSecurityPrivilege 4744 WMIC.exe Token: SeTakeOwnershipPrivilege 4744 WMIC.exe Token: SeLoadDriverPrivilege 4744 WMIC.exe Token: SeSystemProfilePrivilege 4744 WMIC.exe Token: SeSystemtimePrivilege 4744 WMIC.exe Token: SeProfSingleProcessPrivilege 4744 WMIC.exe Token: SeIncBasePriorityPrivilege 4744 WMIC.exe Token: SeCreatePagefilePrivilege 4744 WMIC.exe Token: SeBackupPrivilege 4744 WMIC.exe Token: SeRestorePrivilege 4744 WMIC.exe Token: SeShutdownPrivilege 4744 WMIC.exe Token: SeDebugPrivilege 4744 WMIC.exe Token: SeSystemEnvironmentPrivilege 4744 WMIC.exe Token: SeRemoteShutdownPrivilege 4744 WMIC.exe Token: SeUndockPrivilege 4744 WMIC.exe Token: SeManageVolumePrivilege 4744 WMIC.exe Token: 33 4744 WMIC.exe Token: 34 4744 WMIC.exe Token: 35 4744 WMIC.exe Token: 36 4744 WMIC.exe Token: SeIncreaseQuotaPrivilege 4744 WMIC.exe Token: SeSecurityPrivilege 4744 WMIC.exe Token: SeTakeOwnershipPrivilege 4744 WMIC.exe Token: SeLoadDriverPrivilege 4744 WMIC.exe Token: SeSystemProfilePrivilege 4744 WMIC.exe Token: SeSystemtimePrivilege 4744 WMIC.exe Token: SeProfSingleProcessPrivilege 4744 WMIC.exe Token: SeIncBasePriorityPrivilege 4744 WMIC.exe Token: SeCreatePagefilePrivilege 4744 WMIC.exe Token: SeBackupPrivilege 4744 WMIC.exe Token: SeRestorePrivilege 4744 WMIC.exe Token: SeShutdownPrivilege 4744 WMIC.exe Token: SeDebugPrivilege 4744 WMIC.exe Token: SeSystemEnvironmentPrivilege 4744 WMIC.exe Token: SeRemoteShutdownPrivilege 4744 WMIC.exe Token: SeUndockPrivilege 4744 WMIC.exe Token: SeManageVolumePrivilege 4744 WMIC.exe Token: 33 4744 WMIC.exe Token: 34 4744 WMIC.exe Token: 35 4744 WMIC.exe Token: 36 4744 WMIC.exe Token: SeIncreaseQuotaPrivilege 1320 WMIC.exe Token: SeSecurityPrivilege 1320 WMIC.exe Token: SeTakeOwnershipPrivilege 1320 WMIC.exe Token: SeLoadDriverPrivilege 1320 WMIC.exe Token: SeSystemProfilePrivilege 1320 WMIC.exe Token: SeSystemtimePrivilege 1320 WMIC.exe Token: SeProfSingleProcessPrivilege 1320 WMIC.exe Token: SeIncBasePriorityPrivilege 1320 WMIC.exe Token: SeCreatePagefilePrivilege 1320 WMIC.exe Token: SeBackupPrivilege 1320 WMIC.exe Token: SeRestorePrivilege 1320 WMIC.exe Token: SeShutdownPrivilege 1320 WMIC.exe Token: SeDebugPrivilege 1320 WMIC.exe Token: SeSystemEnvironmentPrivilege 1320 WMIC.exe Token: SeRemoteShutdownPrivilege 1320 WMIC.exe Token: SeUndockPrivilege 1320 WMIC.exe Token: SeManageVolumePrivilege 1320 WMIC.exe Token: 33 1320 WMIC.exe Token: 34 1320 WMIC.exe Token: 35 1320 WMIC.exe Token: 36 1320 WMIC.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
cmd.execmd.execmd.execmd.exedescription pid process target process PID 2408 wrote to memory of 1780 2408 cmd.exe mode.com PID 2408 wrote to memory of 1780 2408 cmd.exe mode.com PID 2408 wrote to memory of 1772 2408 cmd.exe taskkill.exe PID 2408 wrote to memory of 1772 2408 cmd.exe taskkill.exe PID 2408 wrote to memory of 3540 2408 cmd.exe cmd.exe PID 2408 wrote to memory of 3540 2408 cmd.exe cmd.exe PID 3540 wrote to memory of 332 3540 cmd.exe reg.exe PID 3540 wrote to memory of 332 3540 cmd.exe reg.exe PID 2408 wrote to memory of 3684 2408 cmd.exe cmd.exe PID 2408 wrote to memory of 3684 2408 cmd.exe cmd.exe PID 3684 wrote to memory of 1864 3684 cmd.exe reg.exe PID 3684 wrote to memory of 1864 3684 cmd.exe reg.exe PID 2408 wrote to memory of 4744 2408 cmd.exe WMIC.exe PID 2408 wrote to memory of 4744 2408 cmd.exe WMIC.exe PID 2408 wrote to memory of 1320 2408 cmd.exe WMIC.exe PID 2408 wrote to memory of 1320 2408 cmd.exe WMIC.exe PID 2408 wrote to memory of 4464 2408 cmd.exe WMIC.exe PID 2408 wrote to memory of 4464 2408 cmd.exe WMIC.exe PID 2408 wrote to memory of 2784 2408 cmd.exe WMIC.exe PID 2408 wrote to memory of 2784 2408 cmd.exe WMIC.exe PID 2408 wrote to memory of 3756 2408 cmd.exe WMIC.exe PID 2408 wrote to memory of 3756 2408 cmd.exe WMIC.exe PID 2408 wrote to memory of 1944 2408 cmd.exe WMIC.exe PID 2408 wrote to memory of 1944 2408 cmd.exe WMIC.exe PID 2408 wrote to memory of 3356 2408 cmd.exe cmd.exe PID 2408 wrote to memory of 3356 2408 cmd.exe cmd.exe PID 3356 wrote to memory of 4540 3356 cmd.exe ipconfig.exe PID 3356 wrote to memory of 4540 3356 cmd.exe ipconfig.exe PID 3356 wrote to memory of 2592 3356 cmd.exe findstr.exe PID 3356 wrote to memory of 2592 3356 cmd.exe findstr.exe PID 2408 wrote to memory of 2072 2408 cmd.exe WMIC.exe PID 2408 wrote to memory of 2072 2408 cmd.exe WMIC.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\$DESKTOP\查看机器码.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\system32\mode.commode con cols=85 lines=902⤵PID:1780
-
C:\Windows\system32\taskkill.exetaskkill /F /IM WmiPrvSE.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1772 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\HARDWARE\DESCRIPTION\System\BIOS" /v "SystemManufacturer"2⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\system32\reg.exereg query "HKLM\HARDWARE\DESCRIPTION\System\BIOS" /v "SystemManufacturer"3⤵
- Enumerates system info in registry
PID:332 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKLM\HARDWARE\DESCRIPTION\System\BIOS" /v "BaseBoardProduct"2⤵
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\system32\reg.exereg query "HKLM\HARDWARE\DESCRIPTION\System\BIOS" /v "BaseBoardProduct"3⤵
- Enumerates system info in registry
PID:1864 -
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get Name2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4744 -
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get serialnumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1320 -
C:\Windows\System32\Wbem\WMIC.exewmic cpu get serialnumber2⤵PID:4464
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get serialnumber2⤵PID:2784
-
C:\Windows\System32\Wbem\WMIC.exewmic baseboard get serialnumber2⤵PID:3756
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid2⤵PID:1944
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /all|findstr /i "├Φ╩÷ ╬∩└φ╡╪╓╖"2⤵
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\system32\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:4540 -
C:\Windows\system32\findstr.exefindstr /i "├Φ╩÷ ╬∩└φ╡╪╓╖"3⤵PID:2592
-
C:\Windows\System32\Wbem\WMIC.exewmic path Win32_NetworkAdapter where "PNPDeviceID like '%PCI%' AND NetConnectionStatus=2 AND AdapterTypeID='0'" get MacAddress2⤵PID:2072