General
-
Target
Oneclick-V6.1.bat
-
Size
192KB
-
Sample
240525-kedhlsbh37
-
MD5
6f3a6efba11c88a4055c583a5b11a3f8
-
SHA1
baefa7ba870bd2fecf98f03e3755aa947d4d9bb4
-
SHA256
85c26e3f2b78fb7d4ddfba93247f5ad3543e16182380953bda0f44ed2ddec858
-
SHA512
d832e8cb82170061cd1ce8b7e55640917d6a28a4c07e20432107c80df4dbac4848cb691fdeafa215e3877b326f49ba42c8d5deba38de34a515419fb00bde4ee7
-
SSDEEP
1536:pSPKdigMQgPTjIV4BwnywV9UKc+iVX4z6YtW0BZJDk4Jt9:lNPmWXJt9
Static task
static1
Behavioral task
behavioral1
Sample
Oneclick-V6.1.bat
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
Oneclick-V6.1.bat
-
Size
192KB
-
MD5
6f3a6efba11c88a4055c583a5b11a3f8
-
SHA1
baefa7ba870bd2fecf98f03e3755aa947d4d9bb4
-
SHA256
85c26e3f2b78fb7d4ddfba93247f5ad3543e16182380953bda0f44ed2ddec858
-
SHA512
d832e8cb82170061cd1ce8b7e55640917d6a28a4c07e20432107c80df4dbac4848cb691fdeafa215e3877b326f49ba42c8d5deba38de34a515419fb00bde4ee7
-
SSDEEP
1536:pSPKdigMQgPTjIV4BwnywV9UKc+iVX4z6YtW0BZJDk4Jt9:lNPmWXJt9
-
Modifies security service
-
Modifies visibility of file extensions in Explorer
-
Modifies boot configuration data using bcdedit
-
Modifies Installed Components in the registry
-
Possible privilege escalation attempt
-
Modifies file permissions
-
Registers COM server for autorun
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
MITRE ATT&CK Matrix ATT&CK v13
Execution
System Services
2Service Execution
2Command and Scripting Interpreter
1PowerShell
1Persistence
Create or Modify System Process
3Windows Service
3Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Privilege Escalation
Create or Modify System Process
3Windows Service
3Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Defense Evasion
Modify Registry
8Hide Artifacts
1Hidden Files and Directories
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
2File and Directory Permissions Modification
1