Analysis
-
max time kernel
82s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 02:05
Static task
static1
Behavioral task
behavioral1
Sample
.bat
Resource
win10v2004-20240508-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
.bat
-
Size
84B
-
MD5
f69424d2f657ab1db06a979c16de9bf3
-
SHA1
680a086663ebb87014199f3808be7dffc0620327
-
SHA256
b7caf3a183a554054c85b189f2fbd6e22a4e8aa2ba420e6da1703bbd5ab23acc
-
SHA512
f7bbfbe4d1c34e7775456e9e5f67610b7efe6367ab3cbfc8ce53646b99b20ad025d87c20ceca85223276abc755f02dc44583e58d64574e77a0390d9aec913635
Score
7/10
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
cmd.exedescription pid process target process PID 1472 wrote to memory of 4300 1472 cmd.exe msg.exe PID 1472 wrote to memory of 4300 1472 cmd.exe msg.exe PID 1472 wrote to memory of 892 1472 cmd.exe icacls.exe PID 1472 wrote to memory of 892 1472 cmd.exe icacls.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\system32\msg.exemsg good luck2⤵PID:4300
-
C:\Windows\system32\icacls.exeicacls . /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:892