Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 21:31
Static task
static1
Behavioral task
behavioral1
Sample
dropper_1.bat
Resource
win7-20240611-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
dropper_1.bat
Resource
win10v2004-20240226-en
23 signatures
150 seconds
General
-
Target
dropper_1.bat
-
Size
4KB
-
MD5
79ed3c44fbaa266a61ab8764d2c3b520
-
SHA1
277d14837b49e11dee8fbfbe3542b895553d20e2
-
SHA256
23873dba0e67fba174146cc0dfe7c73faf44315447ccb7ce39e3e4eb7a7bc812
-
SHA512
feeb1263aa99115ab4b96752ec97bc30c1e73f8c0adc206dee918f656c34d81ee61d391357895453c1266476cb91223e125e5b4b01aabf28580e00120ab32ea4
-
SSDEEP
48:61jKP/WlIqQ9+iCObFg/7gGcK+hrZahJUrSXYSlDI6p8536anO6jiF6ydr6o3Sqk:ZP/HVbxaLUrCcKoig
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1156 timeout.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
cmd.exedescription pid process target process PID 2180 wrote to memory of 2572 2180 cmd.exe chcp.com PID 2180 wrote to memory of 2572 2180 cmd.exe chcp.com PID 2180 wrote to memory of 2572 2180 cmd.exe chcp.com PID 2180 wrote to memory of 2360 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2360 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2360 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2792 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2792 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2792 2180 cmd.exe reg.exe PID 2180 wrote to memory of 1936 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 1936 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 1936 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 1036 2180 cmd.exe reg.exe PID 2180 wrote to memory of 1036 2180 cmd.exe reg.exe PID 2180 wrote to memory of 1036 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2676 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2676 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2676 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2168 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2168 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2168 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2580 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2580 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2580 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2352 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2352 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2352 2180 cmd.exe reg.exe PID 2180 wrote to memory of 1248 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 1248 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 1248 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2592 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2592 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2592 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2260 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2260 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2260 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2616 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2616 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2616 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2644 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2644 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2644 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2744 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2744 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2744 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2748 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2748 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2748 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2776 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2776 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2776 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2892 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2892 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2892 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2976 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2976 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2976 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2620 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2620 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2620 2180 cmd.exe cmd.exe PID 2180 wrote to memory of 2052 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2052 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2052 2180 cmd.exe reg.exe PID 2180 wrote to memory of 2960 2180 cmd.exe cmd.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\dropper_1.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\chcp.comchcp 650012⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\paths /v wow /d C:\Windows\Resources\$77-sdchost.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\process_names /v wow /d $77-sdchost.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\startup /v wow /d C:\Windows\Resources\$77-sdchost.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\paths /v wow /d C:\Windows\Resources\$77-scchost.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\process_names /v wow /d $77-scchost.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\startup /v wow /d C:\Windows\Resources\$77-scchost.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\paths /v wow /d C:\Windows\Resources\$77-penisware.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\process_names /v wow /d $77-penisware.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\startup /v wow /d C:\Windows\Resources\$77-penisware.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\paths /v wow /d C:\Windows\Resources\$77-penisware2.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\process_names /v wow /d $77-penisware2.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\startup /v wow /d C:\Windows\Resources\$77-penisware2.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\paths /v wow /d C:\Windows\Resources\$77-install.exe2⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y "2⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg add HKEY_LOCAL_MACHINE\SOFTWARE\$77config\process_names /v wow /d $77-install.exe2⤵
-
C:\Windows\system32\timeout.exetimeout 22⤵
- Delays execution with timeout.exe