Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
21-06-2024 12:49
Static task
static1
Behavioral task
behavioral1
Sample
Oneclick-V6.7.bat
Resource
win7-20240611-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
Oneclick-V6.7.bat
Resource
win7-20240508-en
7 signatures
150 seconds
General
-
Target
Oneclick-V6.7.bat
-
Size
201KB
-
MD5
ea994c0d4dcdf963b7b7bf5cf54a26ae
-
SHA1
f16c3d7d5f2fd868d9385b601dc411605ba95342
-
SHA256
5a23e31df8a552f29c44e23a37e19616080d46c75eb2d7db462eb01441106742
-
SHA512
0a065d62966e08d34dc00973d5955b918f0d588f2f03361099b7b21a5696f8da4a07cc5bd8ad2e1b2153ff3372c95d3d6a19a0d8d61aacd4607a6608adb298da
-
SSDEEP
1536:97SPKdigMQgPTjIV4wJzSwTgfGH/ngfHH4pX/WaZSiDk2IWOmXmomk:9nnHgv3h4KmXmomk
Score
4/10
Malware Config
Signatures
-
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 2064 sc.exe 2176 sc.exe 2976 sc.exe -
Delays execution with timeout.exe 2 IoCs
Processes:
timeout.exetimeout.exepid process 2972 timeout.exe 2616 timeout.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid process 2520 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 2520 powershell.exe -
Suspicious use of WriteProcessMemory 48 IoCs
Processes:
cmd.exenet.exedescription pid process target process PID 2932 wrote to memory of 1796 2932 cmd.exe fltMC.exe PID 2932 wrote to memory of 1796 2932 cmd.exe fltMC.exe PID 2932 wrote to memory of 1796 2932 cmd.exe fltMC.exe PID 2932 wrote to memory of 2064 2932 cmd.exe sc.exe PID 2932 wrote to memory of 2064 2932 cmd.exe sc.exe PID 2932 wrote to memory of 2064 2932 cmd.exe sc.exe PID 2932 wrote to memory of 2100 2932 cmd.exe find.exe PID 2932 wrote to memory of 2100 2932 cmd.exe find.exe PID 2932 wrote to memory of 2100 2932 cmd.exe find.exe PID 2932 wrote to memory of 316 2932 cmd.exe find.exe PID 2932 wrote to memory of 316 2932 cmd.exe find.exe PID 2932 wrote to memory of 316 2932 cmd.exe find.exe PID 2932 wrote to memory of 2176 2932 cmd.exe sc.exe PID 2932 wrote to memory of 2176 2932 cmd.exe sc.exe PID 2932 wrote to memory of 2176 2932 cmd.exe sc.exe PID 2932 wrote to memory of 2084 2932 cmd.exe find.exe PID 2932 wrote to memory of 2084 2932 cmd.exe find.exe PID 2932 wrote to memory of 2084 2932 cmd.exe find.exe PID 2932 wrote to memory of 2824 2932 cmd.exe find.exe PID 2932 wrote to memory of 2824 2932 cmd.exe find.exe PID 2932 wrote to memory of 2824 2932 cmd.exe find.exe PID 2932 wrote to memory of 2976 2932 cmd.exe sc.exe PID 2932 wrote to memory of 2976 2932 cmd.exe sc.exe PID 2932 wrote to memory of 2976 2932 cmd.exe sc.exe PID 2932 wrote to memory of 2692 2932 cmd.exe net.exe PID 2932 wrote to memory of 2692 2932 cmd.exe net.exe PID 2932 wrote to memory of 2692 2932 cmd.exe net.exe PID 2692 wrote to memory of 2604 2692 net.exe net1.exe PID 2692 wrote to memory of 2604 2692 net.exe net1.exe PID 2692 wrote to memory of 2604 2692 net.exe net1.exe PID 2932 wrote to memory of 2972 2932 cmd.exe timeout.exe PID 2932 wrote to memory of 2972 2932 cmd.exe timeout.exe PID 2932 wrote to memory of 2972 2932 cmd.exe timeout.exe PID 2932 wrote to memory of 3036 2932 cmd.exe chcp.com PID 2932 wrote to memory of 3036 2932 cmd.exe chcp.com PID 2932 wrote to memory of 3036 2932 cmd.exe chcp.com PID 2932 wrote to memory of 2616 2932 cmd.exe timeout.exe PID 2932 wrote to memory of 2616 2932 cmd.exe timeout.exe PID 2932 wrote to memory of 2616 2932 cmd.exe timeout.exe PID 2932 wrote to memory of 2660 2932 cmd.exe chcp.com PID 2932 wrote to memory of 2660 2932 cmd.exe chcp.com PID 2932 wrote to memory of 2660 2932 cmd.exe chcp.com PID 2932 wrote to memory of 2836 2932 cmd.exe chcp.com PID 2932 wrote to memory of 2836 2932 cmd.exe chcp.com PID 2932 wrote to memory of 2836 2932 cmd.exe chcp.com PID 2932 wrote to memory of 2520 2932 cmd.exe powershell.exe PID 2932 wrote to memory of 2520 2932 cmd.exe powershell.exe PID 2932 wrote to memory of 2520 2932 cmd.exe powershell.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Oneclick-V6.7.bat"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\fltMC.exefltmc2⤵
-
C:\Windows\system32\sc.exesc query "WinDefend"2⤵
- Launches sc.exe
-
C:\Windows\system32\find.exefind "STATE"2⤵
-
C:\Windows\system32\find.exefind "RUNNING"2⤵
-
C:\Windows\system32\sc.exesc qc "TrustedInstaller"2⤵
- Launches sc.exe
-
C:\Windows\system32\find.exefind "START_TYPE"2⤵
-
C:\Windows\system32\find.exefind "DISABLED"2⤵
-
C:\Windows\system32\sc.exesc config TrustedInstaller start=auto2⤵
- Launches sc.exe
-
C:\Windows\system32\net.exenet start TrustedInstaller2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start TrustedInstaller3⤵
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\chcp.comchcp 650012⤵
-
C:\Windows\system32\timeout.exetimeout 22⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\chcp.comchcp 650012⤵
-
C:\Windows\system32\chcp.comchcp 4372⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Write-Host 'Recommended!' -ForegroundColor White -BackgroundColor Red"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵