Resubmissions

10-07-2024 02:30

240710-czl2gstcke 10

20-06-2024 12:39

240620-pvzs1axflf 10

20-06-2024 12:36

240620-pswcss1hrr 7

20-06-2024 12:35

240620-psqgjs1hrm 10

20-06-2024 12:33

240620-prd25axdpg 10

Analysis

  • max time kernel
    1794s
  • max time network
    1804s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-06-2024 12:33

General

  • Target

    spoofers/serial_checker.bat

  • Size

    437B

  • MD5

    0c088b6adc55c20fc375badef6f7e9a7

  • SHA1

    37c865ebfe537b94534844281e9086462f3e2462

  • SHA256

    51f783d41ad3a807344eb9550d65cb4638793aac71f4eb4a1a11414b24e339e1

  • SHA512

    7f82c647413f997a537148ab7d1e8a5cff9fef18561783f329485dbb67ab76a2a8defa0a7304feb7e1e79645b50b8cb2d4a069ff3ec668542fdefb1adbde6f5d

Score
1/10

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\spoofers\serial_checker.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2944
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic diskdrive get model, serialnumber
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2576
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic cpu get serialnumber
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2432
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic bios get serialnumber
      2⤵
        PID:5040
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic baseboard get serialnumber
        2⤵
          PID:4460
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic path win32_computersystemproduct get uuid
          2⤵
            PID:1920
          • C:\Windows\system32\getmac.exe
            getmac
            2⤵
              PID:4164
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4064,i,3595107284059830391,18018199024659337217,262144 --variations-seed-version --mojo-platform-channel-handle=4308 /prefetch:8
            1⤵
              PID:3004
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1312,i,3595107284059830391,18018199024659337217,262144 --variations-seed-version --mojo-platform-channel-handle=1292 /prefetch:8
              1⤵
                PID:180

              Network

              MITRE ATT&CK Matrix

              Replay Monitor

              Loading Replay Monitor...

              Downloads