Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240508-en
  • resource tags

    arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    30-05-2024 20:20

Errors

Reason
Machine shutdown

General

  • Target

    FREE_ULTIMATE_TWEAKS.bat

  • Size

    57KB

  • MD5

    be59475363e7986160a67e9240bc7e8f

  • SHA1

    d57f6d8d702886fcb46a0e5508c55c22e4ff4d56

  • SHA256

    f9810593973b9899f35b84985f45d38e60be20a0f14df7a2b583478f13b70295

  • SHA512

    6d14230576f6dce2023952579ed1c6a81e7c9dadeb0dfc12f89938e3a8b7e95752053e89ada4e372fb2b053dc48aef4d2ecab850a498d894d461c05b76be32a9

  • SSDEEP

    384:zHtF3ll+uFuP0Oblw8Y6AhY8/jCrh8uvBya508mi:NFQDAhY8/jCriAlOi

Score
8/10

Malware Config

Signatures

  • Sets file execution options in registry 2 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\FREE_ULTIMATE_TWEAKS.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:816
    • C:\Windows\system32\chcp.com
      chcp 65001
      2⤵
        PID:5004
      • C:\Windows\system32\chcp.com
        chcp 65001
        2⤵
          PID:1056
        • C:\Windows\system32\reg.exe
          Reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FortniteClient-Win64-Shipping.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "3" /f
          2⤵
          • Sets file execution options in registry
          PID:3144
        • C:\Windows\system32\reg.exe
          Reg.exe add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ValorantClient-Win64-Shipping.exe\PerfOptions" /v "CpuPriorityClass" /t REG_DWORD /d "3" /f
          2⤵
          • Sets file execution options in registry
          PID:2008
        • C:\Windows\system32\chcp.com
          chcp 65001
          2⤵
            PID:4916
          • C:\Windows\system32\chcp.com
            chcp 65001
            2⤵
              PID:1416
          • C:\Windows\system32\LogonUI.exe
            "LogonUI.exe" /flags:0x4 /state0:0xa3a09855 /state1:0x41c64e6d
            1⤵
            • Modifies data under HKEY_USERS
            • Suspicious use of SetWindowsHookEx
            PID:2392

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads