Resubmissions

Analysis

  • max time kernel
    45s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    06/06/2024, 23:18

Errors

Reason
Machine shutdown

General

  • Target

    @echo off .txt

  • Size

    386B

  • MD5

    ee6ec64cad2296471d9d55dfb6120168

  • SHA1

    1d09f7f4ddf133a229cec131779f4d01eaf6af36

  • SHA256

    c416d8c22ff8083106cca7cd0d520978a9b106363b953564c5dc905e351788c8

  • SHA512

    822757f5d65f960c112a1a355c1a2c07a9142b1877e1a4a65982ef6d450da301cb6eabd44745e0cb8d2d6cdf561264879f1e9f6c21e62c2a1b7a9a43b34e441d

Score
1/10

Malware Config

Signatures

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 58 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\NOTEPAD.EXE
    C:\Windows\system32\NOTEPAD.EXE "C:\Users\Admin\AppData\Local\Temp\@echo off .txt"
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:3036
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:2536
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\Downloads\@echo off .bat" "
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\Windows\system32\timeout.exe
        timeout 3
        2⤵
        • Delays execution with timeout.exe
        PID:2860
      • C:\Windows\system32\shutdown.exe
        shutdown -s -t 1
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2816
    • C:\Windows\system32\LogonUI.exe
      "LogonUI.exe" /flags:0x0
      1⤵
        PID:772
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x1
        1⤵
          PID:328

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\Downloads\@echo off .bat

          Filesize

          384B

          MD5

          c96e82a8aede66f96f5f45218324e566

          SHA1

          17fe1da0400e9023a48afbbdce84a1bf3eb9705f

          SHA256

          69a8a99d12746ec0e54a0bd54080461c0eccfc62b8aed97ec08535b940efde6d

          SHA512

          3bb139f09f9b9ea8d14818c44c9643301ca8cda0754ab8595be24653c0be3bfa6d2d043bd906ed12106eedb8a6fe0d2ea649578efa1e0c09c564dca492358a12

        • memory/3036-0-0x0000000003B00000-0x0000000003B10000-memory.dmp

          Filesize

          64KB