Analysis
-
max time kernel
131s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2024, 13:18
Static task
static1
Behavioral task
behavioral1
Sample
Script.cmd
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Script.cmd
Resource
win10v2004-20240508-en
General
-
Target
Script.cmd
-
Size
10KB
-
MD5
e989bb0ae32b8b75aa8af97e95483602
-
SHA1
e9c1e12aeb59dd721a068a553f3e24e3239b2d23
-
SHA256
b885cecbb8978170a237bafb160e92fa6afd65db1c8e2f33098bac5e1712ba25
-
SHA512
54925f5a5067960d8a27f73bf5e856562765ce317a1497335b9be71d621bf397d7af75760df02f695ed84bd57698077cb89e308a826b053d16c9da76b01f9846
-
SSDEEP
96:NbQh9YG7IHKryL4jxV+feDPVlpicDwt/dYjxmYPYgBugajMLCeOeEPxS72wusuEQ:Nb3JqryL4jx0GDPVlZHggm7en5UR5
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2708 powershell.exe 2708 powershell.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2708 powershell.exe Token: SeBackupPrivilege 4388 vssvc.exe Token: SeRestorePrivilege 4388 vssvc.exe Token: SeAuditPrivilege 4388 vssvc.exe Token: SeBackupPrivilege 4672 srtasks.exe Token: SeRestorePrivilege 4672 srtasks.exe Token: SeSecurityPrivilege 4672 srtasks.exe Token: SeTakeOwnershipPrivilege 4672 srtasks.exe Token: SeBackupPrivilege 4672 srtasks.exe Token: SeRestorePrivilege 4672 srtasks.exe Token: SeSecurityPrivilege 4672 srtasks.exe Token: SeTakeOwnershipPrivilege 4672 srtasks.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 452 wrote to memory of 3848 452 cmd.exe 86 PID 452 wrote to memory of 3848 452 cmd.exe 86 PID 3848 wrote to memory of 3868 3848 net.exe 87 PID 3848 wrote to memory of 3868 3848 net.exe 87 PID 452 wrote to memory of 1144 452 cmd.exe 88 PID 452 wrote to memory of 1144 452 cmd.exe 88 PID 452 wrote to memory of 2708 452 cmd.exe 89 PID 452 wrote to memory of 2708 452 cmd.exe 89 PID 452 wrote to memory of 2512 452 cmd.exe 113 PID 452 wrote to memory of 2512 452 cmd.exe 113 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Script.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:3868
-
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v SystemRestorePointCreationFrequency /t REG_DWORD /d 0 /f2⤵PID:1144
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Checkpoint-Computer -Description "Utilisation-du-script-de-Kidou" -RestorePointType MODIFY_SETTINGS2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v SystemRestorePointCreationFrequency /t REG_DWORD /d 1440 /f2⤵PID:2512
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:4672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82