Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    06-06-2024 06:49

General

  • Target

    usr/src/trojan-cli/start.bat

  • Size

    125B

  • MD5

    28a76ea0807ab465e50759dfb8f047a6

  • SHA1

    a6d30c0111786f8a8247668ea3d1b34537c43466

  • SHA256

    5452fcc9cb06a221ab839f56e77be1003be33157d47ef0a286deb9b81f000e89

  • SHA512

    c40b394b9b0384494be89c14e1605578b565a40ff8bd3067c80464e357abcd17ed3df5af86b72eb1f7fc8020dcb4f3970e29bcb54970292775304d4cb4d3b508

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\usr\src\trojan-cli\start.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Windows\system32\mshta.exe
      mshta vbscript:createobject("wscript.shell").run("""C:\Users\Admin\AppData\Local\Temp\usr\src\trojan-cli\start.bat"" ::",0)(window.close)
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\usr\src\trojan-cli\start.bat" ::"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2928
        • C:\Users\Admin\AppData\Local\Temp\usr\src\trojan-cli\trojan.exe
          trojan.exe
          4⤵
            PID:2808

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads