Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16/06/2024, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
Install_New_theme.bat
Resource
win7-20231129-en
4 signatures
150 seconds
General
-
Target
Install_New_theme.bat
-
Size
600B
-
MD5
99638e3caf39bd8aac3010f291727fcd
-
SHA1
f688f9f969ffaf78c62f17f8a8df44490b952514
-
SHA256
a461119f4dcaca45b8438792b6daba9a83d520f47127ebb7a7ed6d68c0ac1008
-
SHA512
638bdc5e83558daf1c3d14e1ef3669d578ce3bc0df7c4643441e00d1d334397d409bb1329f07d559f0b7de21cfee406abfde24f7bc4d3129f2cf52e53612e84f
Score
3/10
Malware Config
Signatures
-
pid Process 1812 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1812 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1812 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2416 wrote to memory of 1812 2416 cmd.exe 29 PID 2416 wrote to memory of 1812 2416 cmd.exe 29 PID 2416 wrote to memory of 1812 2416 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Install_New_theme.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -Command [Net.ServicePointManager]::SecurityProtocol = [Net.ServicePointManager]::SecurityProtocol -bor [Net.SecurityProtocolType]::Tls12; $p='-new_theme'; """ & { $(try { iwr -useb 'https://raw.githubusercontent.com/SpotX-Official/spotx-official.github.io/main/run.ps1' } catch { $p+= ' -m'; iwr -useb 'https://spotx-official.github.io/run.ps1' })} $p """" | iex2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812
-