Analysis

  • max time kernel
    144s
  • max time network
    52s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/06/2024, 20:42

General

  • Target

    Crusher.bat

  • Size

    122B

  • MD5

    e731ae3239030d9b1b59736da83678a0

  • SHA1

    575add90f5dd29ca3821a809ef74be05cf12ecd8

  • SHA256

    491e86387d7e5e677f1122851e92f19b6723f3772437fbf906e6b1fe8aa49967

  • SHA512

    a0870ca77222301c817e7dd2a750ebb2aad9169544993a1e4541d4d638a448c67b6b9f1b0f20fa4728e2a1b28912bc682a04750355c1a3a8e285ed91c424f4a3

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Crusher.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3204
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -window hidden -command
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1892
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K laughpayload.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4852
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -window hidden -command
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3956
      • C:\Users\Admin\AppData\Local\Temp\nircmd.exe
        nircmd mediaplay 100000000000000000000000 "laugh.mp3"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        PID:3828
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K windowpayload.bat
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1448
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell -window hidden -command
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4468
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
        3⤵
          PID:1708
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
          3⤵
            PID:3268
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
            3⤵
              PID:4748
            • C:\Windows\System32\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
              3⤵
                PID:3124
              • C:\Windows\System32\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                3⤵
                  PID:3316
                • C:\Windows\System32\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                  3⤵
                    PID:4060
                  • C:\Windows\System32\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                    3⤵
                      PID:1520
                    • C:\Windows\System32\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                      3⤵
                        PID:2932
                      • C:\Windows\System32\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                        3⤵
                          PID:4700
                        • C:\Windows\System32\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                          3⤵
                            PID:4688
                          • C:\Windows\System32\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                            3⤵
                              PID:4908
                            • C:\Windows\System32\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                              3⤵
                                PID:5048
                              • C:\Windows\System32\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                                3⤵
                                  PID:2364
                                • C:\Windows\System32\WScript.exe
                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                                  3⤵
                                    PID:2884
                                  • C:\Windows\System32\WScript.exe
                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                                    3⤵
                                      PID:3004
                                    • C:\Windows\System32\WScript.exe
                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                                      3⤵
                                        PID:4080
                                      • C:\Windows\System32\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                                        3⤵
                                          PID:1936
                                        • C:\Windows\System32\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                                          3⤵
                                            PID:748
                                          • C:\Windows\System32\WScript.exe
                                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                                            3⤵
                                              PID:4996
                                            • C:\Windows\System32\WScript.exe
                                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                                              3⤵
                                                PID:1748
                                              • C:\Windows\System32\WScript.exe
                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                                                3⤵
                                                  PID:2052
                                                • C:\Windows\System32\WScript.exe
                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                                                  3⤵
                                                    PID:1584
                                                  • C:\Windows\System32\WScript.exe
                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                                                    3⤵
                                                      PID:3724
                                                    • C:\Windows\System32\WScript.exe
                                                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"
                                                      3⤵
                                                        PID:4696
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /K freddurstpayload.bat
                                                      2⤵
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:3396
                                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                        powershell -window hidden -command
                                                        3⤵
                                                        • Command and Scripting Interpreter: PowerShell
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4080
                                                  • C:\Windows\system32\AUDIODG.EXE
                                                    C:\Windows\system32\AUDIODG.EXE 0x304 0x300
                                                    1⤵
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:3552

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                    Filesize

                                                    2KB

                                                    MD5

                                                    cd488961db34aaa8ef3178208699448e

                                                    SHA1

                                                    a32ca7998015f97e09c1245bed2791e9c0ec81f9

                                                    SHA256

                                                    59804d7599fb39235424f498e5fa4cd2434b2a924f37d60f842ea4a536e390ad

                                                    SHA512

                                                    59ab7742cb29fa66c86b3ebe63605de647b4e1d874523eb95dac2d4c8db88c65afb906315fe43ebe69bbe2b9087cf4ffea977605aac7d2eb39fbf698ee0c005e

                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive

                                                    Filesize

                                                    64B

                                                    MD5

                                                    446dd1cf97eaba21cf14d03aebc79f27

                                                    SHA1

                                                    36e4cc7367e0c7b40f4a8ace272941ea46373799

                                                    SHA256

                                                    a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf

                                                    SHA512

                                                    a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xafjtmk2.vhb.ps1

                                                    Filesize

                                                    60B

                                                    MD5

                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                    SHA1

                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                    SHA256

                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                    SHA512

                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                  • memory/1892-56-0x00007FF9A8010000-0x00007FF9A8AD1000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/1892-2-0x00000255B0310000-0x00000255B0332000-memory.dmp

                                                    Filesize

                                                    136KB

                                                  • memory/1892-13-0x00007FF9A8010000-0x00007FF9A8AD1000-memory.dmp

                                                    Filesize

                                                    10.8MB

                                                  • memory/1892-0-0x00007FF9A8013000-0x00007FF9A8015000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/3828-46-0x0000000000400000-0x000000000041B000-memory.dmp

                                                    Filesize

                                                    108KB

                                                  • memory/3828-52-0x00000000029E0000-0x00000000029F0000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/3828-51-0x00000000029E0000-0x00000000029F0000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/3828-50-0x00000000029E0000-0x00000000029F0000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/3828-53-0x00000000029E0000-0x00000000029F0000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/3828-54-0x0000000000400000-0x000000000041B000-memory.dmp

                                                    Filesize

                                                    108KB

                                                  • memory/3828-49-0x00000000029E0000-0x00000000029F0000-memory.dmp

                                                    Filesize

                                                    64KB