Analysis

  • max time kernel
    1s
  • max time network
    4s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-06-2024 16:16

Errors

Reason
Machine shutdown

General

  • Target

    UnBan Guide/step 6/Cleaner.bat

  • Size

    6KB

  • MD5

    86ba1c1072f4aa443fff2127ef7673be

  • SHA1

    85faeff420ac5d2e98167801ffd2615a620f3b3b

  • SHA256

    c84c9d99dfa2c138c91a70601ffb7dd31c8274f8f6099fbcb7468d72b0af77a7

  • SHA512

    a43de29d3020fa3a601031a7ec3ba438725bb55f2b3170adab7599d5b609358df8f04a0c75ac0dc1a6079c6ce694428e8c41f29db6fe3efd22e48075d2e4c8c6

  • SSDEEP

    96:TBXULDHRRpTd2ZVEERnRlJRhceRCJEykGwkaRMRbmzR51+BRIARS1XMrI:TBkHHjHmVtNNJYJEyZwlyVmzkBjUN

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 16 IoCs
  • Drops file in Windows directory 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 42 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\UnBan Guide\step 6\Cleaner.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Users\Admin\AppData\Local\Temp\UnBan Guide\step 6\AMIDEWINx64.EXE
      AMIDEWINx64.exe /SU
      2⤵
        PID:1164
      • C:\Windows\system32\find.exe
        find /i "Error"
        2⤵
          PID:1072
        • C:\Users\Admin\AppData\Local\Temp\UnBan Guide\step 6\H2OSDE-Wx64.exe
          H2OSDE-Wx64.exe -SU 28152
          2⤵
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          PID:2124
        • C:\Windows\system32\find.exe
          find /i "readonly"
          2⤵
            PID:4436
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s DeviceInstall
          1⤵
          • Drops file in Windows directory
          • Checks SCSI registry key(s)
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4048
          • C:\Windows\system32\DrvInst.exe
            DrvInst.exe "4" "0" "C:\Users\Admin\AppData\Local\Temp\{73d5aa22-d1c5-404a-a231-7e7fe794665d}\segwindrv.inf" "9" "49f798bf3" "0000000000000128" "WinSta0\Default" "000000000000015C" "208" "c:\users\admin\appdata\local\temp\unban guide\step 6"
            2⤵
            • Drops file in System32 directory
            • Drops file in Windows directory
            • Checks SCSI registry key(s)
            • Modifies data under HKEY_USERS
            PID:2020
          • C:\Windows\system32\DrvInst.exe
            DrvInst.exe "2" "211" "ROOT\INSYDESEG\0000" "C:\Windows\INF\oem3.inf" "oem3.inf:ed86ca1156c0ee7a:Insyde_Device64:6.1.7600.16385:{416c2604-443b-436f-9e1d-607bdc3cc785}\segwindrv," "49f798bf3" "0000000000000100"
            2⤵
            • Drops file in Windows directory
            PID:2636

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\{73D5A~1\segwindrvx64.sys

          Filesize

          103KB

          MD5

          e46dfe45c1714f4920d3fd2546f2f630

          SHA1

          28cdb0b48c1d88d71421ec9e40ce52836ab79956

          SHA256

          b44f4384f95cc9d3f86f0c27fc0abba9a291a7cc24483f41e70c1234bc61edc6

          SHA512

          97480d19e22ebef836e61f33d5540c41a08a9edc71af97a59fef71b3d60abd9ab78b32896ee0812cae1780da08f875e3cb32c048edf4fcae523fa04e23d2246c

        • C:\Users\Admin\AppData\Local\Temp\{73d5aa22-d1c5-404a-a231-7e7fe794665d}\segwindrv.inf

          Filesize

          4KB

          MD5

          843fb7475608ce359da7cbd48fa3ab1d

          SHA1

          ae16643aa1756b34391e4c615958343ecb17b153

          SHA256

          e1449864c7403b9cd3d828c6fc9710fe1fbb3f35c7b6522a5dcbcf97685f40d7

          SHA512

          9db610ebff1ab1e24147abadf10f978eab95358f2b0806d17fb8df6e53723b0523dd26d0207430d029f5b6826a02c3a5d73ff01d8f6e28d53e82c230075f2b34

        • C:\Windows\System32\DriverStore\Temp\{a851ca13-6e29-7043-9d62-03ecc697f37a}\SET7938.tmp

          Filesize

          10KB

          MD5

          43d3603cf918445cbd1d7253b49bf527

          SHA1

          fabfaee55f2c4e6ca508d735b297bdb738ab1c7d

          SHA256

          e830efe7786b0fb9dd84eb647614fa1795ec5caa605d44d9a13f0fdbd0f4d6b5

          SHA512

          183b8498e4c86966050be324a027fc0a7f8179bb77d032ec97cf64ab91dac72c8e7fcdda36c733c2815973b72c91cee19d3263376a7e3b955c616f548690186e