Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 21:32
Static task
static1
Behavioral task
behavioral1
Sample
dropper_1.bat
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
dropper_1.bat
Resource
win10v2004-20240611-en
29 signatures
150 seconds
General
-
Target
dropper_1.bat
-
Size
4KB
-
MD5
e0defb53b0356203d8b434deeefe5915
-
SHA1
a8451249841e6644fee5749c3fce921a0a5e3442
-
SHA256
37f0f3680bd1eb5c157783175e2e27706c87ad3968366cd849599c8f10e494f3
-
SHA512
5c1a63000547fb8420e9d61e36b759ca2ee920e833c250233055364111d1b8712587b17a85cfbd1d807309b4ce932600c77dfecd0c8c88808a950a97f48cb45e
-
SSDEEP
48:61jKP/WlIqQ9+iCObFg/7gGcK+hrZahJUrSXYSlDI6p8536anO6jiF6ydr6o3SqB:ZP/HVbxaLUrCcKoit
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2532 timeout.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exedescription pid process target process PID 1040 wrote to memory of 2876 1040 cmd.exe chcp.com PID 1040 wrote to memory of 2876 1040 cmd.exe chcp.com PID 1040 wrote to memory of 2876 1040 cmd.exe chcp.com PID 1040 wrote to memory of 2924 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2924 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2924 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 1984 1040 cmd.exe reg.exe PID 1040 wrote to memory of 1984 1040 cmd.exe reg.exe PID 1040 wrote to memory of 1984 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2456 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2456 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2456 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2936 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2936 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2936 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2872 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2872 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2872 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2888 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2888 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2888 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2508 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2508 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2508 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2472 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2472 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2472 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2556 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2556 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2556 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2580 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2580 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2580 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2584 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2584 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2584 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2616 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2616 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2616 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2636 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2636 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2636 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2564 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2564 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2564 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2524 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2524 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2524 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2628 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2628 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2628 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2496 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2496 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2496 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2648 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2648 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2648 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2500 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2500 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2500 1040 cmd.exe cmd.exe PID 1040 wrote to memory of 2548 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2548 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2548 1040 cmd.exe reg.exe PID 1040 wrote to memory of 2900 1040 cmd.exe cmd.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\dropper_1.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650012⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\paths /v wow /d C:\Windows\Resources\$77-sdchost.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\process_names /v wow /d $77-sdchost.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\startup /v wow /d C:\Windows\Resources\$77-sdchost.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\paths /v wow /d C:\Windows\Resources\$77-scchost.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\process_names /v wow /d $77-scchost.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\startup /v wow /d C:\Windows\Resources\$77-scchost.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\paths /v wow /d C:\Windows\Resources\$77-penisware.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\process_names /v wow /d $77-penisware.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\startup /v wow /d C:\Windows\Resources\$77-penisware.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\paths /v wow /d C:\Windows\Resources\$77-penisware2.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\process_names /v wow /d $77-penisware2.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\startup /v wow /d C:\Windows\Resources\$77-penisware2.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\paths /v wow /d C:\Windows\Resources\$77-install.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\process_names /v wow /d $77-install.exe2⤵
-
C:\Windows\system32\timeout.exetimeout 22⤵
- Delays execution with timeout.exe