Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 16:25
Static task
static1
Behavioral task
behavioral1
Sample
Windows_Update.bat
Resource
win7-20240508-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Windows_Update.bat
Resource
win10v2004-20240508-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
Windows_Update.bat
-
Size
623B
-
MD5
54cc5be48ccd0f3ebd942bb4b8d6df94
-
SHA1
6244bfcd1747c623ebb0f5b4c05d7c55733d4402
-
SHA256
f0b5285ad8f1762007fd560a554775113e64834b512324abd5ff7b333a7f37e8
-
SHA512
39a2820789000c53f03c118f8d120a32afdff5ab802b509eb50b4439ff9e2cb11f5c278737f13c8a54fa6d89ef74fe1930a4e1cbc5a8abc908e903611bd94137
Score
3/10
Malware Config
Signatures
-
pid Process 2740 powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2708 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2740 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2740 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2400 wrote to memory of 2060 2400 cmd.exe 29 PID 2400 wrote to memory of 2060 2400 cmd.exe 29 PID 2400 wrote to memory of 2060 2400 cmd.exe 29 PID 2060 wrote to memory of 2740 2060 cmd.exe 31 PID 2060 wrote to memory of 2740 2060 cmd.exe 31 PID 2060 wrote to memory of 2740 2060 cmd.exe 31 PID 2060 wrote to memory of 2708 2060 cmd.exe 32 PID 2060 wrote to memory of 2708 2060 cmd.exe 32 PID 2060 wrote to memory of 2708 2060 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Windows_Update.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\Windows_Update.bat" MY_FLAG2⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -File "C:\Users\Admin\Pictures\payload.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\system32\timeout.exetimeout /t 5 /nobreak3⤵
- Delays execution with timeout.exe
PID:2708
-
-