Overview
overview
8Static
static
7Crusher.bat
windows7-x64
8Crusher.bat
windows10-2004-x64
8freddurstpayload.bat
windows7-x64
8freddurstpayload.bat
windows10-2004-x64
8laughpayload.bat
windows7-x64
8laughpayload.bat
windows10-2004-x64
8lol.vbs
windows7-x64
1lol.vbs
windows10-2004-x64
1nircmd.exe
windows7-x64
7nircmd.exe
windows10-2004-x64
7windowpayload.bat
windows7-x64
8windowpayload.bat
windows10-2004-x64
8Analysis
-
max time kernel
144s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29/06/2024, 20:42
Behavioral task
behavioral1
Sample
Crusher.bat
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
Crusher.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
freddurstpayload.bat
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
freddurstpayload.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
laughpayload.bat
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
laughpayload.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
lol.vbs
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
lol.vbs
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
nircmd.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
nircmd.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral11
Sample
windowpayload.bat
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
windowpayload.bat
Resource
win10v2004-20240508-en
General
-
Target
Crusher.bat
-
Size
122B
-
MD5
e731ae3239030d9b1b59736da83678a0
-
SHA1
575add90f5dd29ca3821a809ef74be05cf12ecd8
-
SHA256
491e86387d7e5e677f1122851e92f19b6723f3772437fbf906e6b1fe8aa49967
-
SHA512
a0870ca77222301c817e7dd2a750ebb2aad9169544993a1e4541d4d638a448c67b6b9f1b0f20fa4728e2a1b28912bc682a04750355c1a3a8e285ed91c424f4a3
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell and hide display window.
pid Process 1892 powershell.exe 4468 powershell.exe 3956 powershell.exe 4080 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation cmd.exe -
resource yara_rule behavioral2/memory/3828-46-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral2/memory/3828-54-0x0000000000400000-0x000000000041B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1892 powershell.exe 3956 powershell.exe 4468 powershell.exe 4080 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3828 nircmd.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1892 powershell.exe Token: SeDebugPrivilege 3956 powershell.exe Token: SeDebugPrivilege 4468 powershell.exe Token: SeDebugPrivilege 4080 powershell.exe Token: 33 3552 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3552 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3204 wrote to memory of 1892 3204 cmd.exe 81 PID 3204 wrote to memory of 1892 3204 cmd.exe 81 PID 3204 wrote to memory of 4852 3204 cmd.exe 82 PID 3204 wrote to memory of 4852 3204 cmd.exe 82 PID 3204 wrote to memory of 1448 3204 cmd.exe 84 PID 3204 wrote to memory of 1448 3204 cmd.exe 84 PID 3204 wrote to memory of 3396 3204 cmd.exe 86 PID 3204 wrote to memory of 3396 3204 cmd.exe 86 PID 1448 wrote to memory of 4468 1448 cmd.exe 88 PID 1448 wrote to memory of 4468 1448 cmd.exe 88 PID 4852 wrote to memory of 3956 4852 cmd.exe 89 PID 4852 wrote to memory of 3956 4852 cmd.exe 89 PID 3396 wrote to memory of 4080 3396 cmd.exe 90 PID 3396 wrote to memory of 4080 3396 cmd.exe 90 PID 4852 wrote to memory of 3828 4852 cmd.exe 91 PID 4852 wrote to memory of 3828 4852 cmd.exe 91 PID 4852 wrote to memory of 3828 4852 cmd.exe 91 PID 1448 wrote to memory of 1708 1448 cmd.exe 92 PID 1448 wrote to memory of 1708 1448 cmd.exe 92 PID 1448 wrote to memory of 3268 1448 cmd.exe 94 PID 1448 wrote to memory of 3268 1448 cmd.exe 94 PID 1448 wrote to memory of 4748 1448 cmd.exe 95 PID 1448 wrote to memory of 4748 1448 cmd.exe 95 PID 1448 wrote to memory of 3124 1448 cmd.exe 96 PID 1448 wrote to memory of 3124 1448 cmd.exe 96 PID 1448 wrote to memory of 3316 1448 cmd.exe 97 PID 1448 wrote to memory of 3316 1448 cmd.exe 97 PID 1448 wrote to memory of 4060 1448 cmd.exe 100 PID 1448 wrote to memory of 4060 1448 cmd.exe 100 PID 1448 wrote to memory of 1520 1448 cmd.exe 101 PID 1448 wrote to memory of 1520 1448 cmd.exe 101 PID 1448 wrote to memory of 2932 1448 cmd.exe 104 PID 1448 wrote to memory of 2932 1448 cmd.exe 104 PID 1448 wrote to memory of 4700 1448 cmd.exe 107 PID 1448 wrote to memory of 4700 1448 cmd.exe 107 PID 1448 wrote to memory of 4688 1448 cmd.exe 109 PID 1448 wrote to memory of 4688 1448 cmd.exe 109 PID 1448 wrote to memory of 4908 1448 cmd.exe 110 PID 1448 wrote to memory of 4908 1448 cmd.exe 110 PID 1448 wrote to memory of 5048 1448 cmd.exe 111 PID 1448 wrote to memory of 5048 1448 cmd.exe 111 PID 1448 wrote to memory of 2364 1448 cmd.exe 112 PID 1448 wrote to memory of 2364 1448 cmd.exe 112 PID 1448 wrote to memory of 2884 1448 cmd.exe 113 PID 1448 wrote to memory of 2884 1448 cmd.exe 113 PID 1448 wrote to memory of 3004 1448 cmd.exe 114 PID 1448 wrote to memory of 3004 1448 cmd.exe 114 PID 1448 wrote to memory of 4080 1448 cmd.exe 115 PID 1448 wrote to memory of 4080 1448 cmd.exe 115 PID 1448 wrote to memory of 1936 1448 cmd.exe 116 PID 1448 wrote to memory of 1936 1448 cmd.exe 116 PID 1448 wrote to memory of 748 1448 cmd.exe 117 PID 1448 wrote to memory of 748 1448 cmd.exe 117 PID 1448 wrote to memory of 4996 1448 cmd.exe 118 PID 1448 wrote to memory of 4996 1448 cmd.exe 118 PID 1448 wrote to memory of 1748 1448 cmd.exe 119 PID 1448 wrote to memory of 1748 1448 cmd.exe 119 PID 1448 wrote to memory of 2052 1448 cmd.exe 120 PID 1448 wrote to memory of 2052 1448 cmd.exe 120 PID 1448 wrote to memory of 1584 1448 cmd.exe 121 PID 1448 wrote to memory of 1584 1448 cmd.exe 121 PID 1448 wrote to memory of 3724 1448 cmd.exe 122 PID 1448 wrote to memory of 3724 1448 cmd.exe 122 PID 1448 wrote to memory of 4696 1448 cmd.exe 123
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Crusher.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -window hidden -command2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K laughpayload.bat2⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -window hidden -command3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
C:\Users\Admin\AppData\Local\Temp\nircmd.exenircmd mediaplay 100000000000000000000000 "laugh.mp3"3⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:3828
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K windowpayload.bat2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -window hidden -command3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:1708
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:3268
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:4748
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:3124
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:3316
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:4060
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:1520
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:2932
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:4700
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:4688
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:4908
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:5048
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:2364
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:2884
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:3004
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:4080
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:1936
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:748
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:4996
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:1748
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:2052
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:1584
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:3724
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lol.vbs"3⤵PID:4696
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K freddurstpayload.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -window hidden -command3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4080
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x304 0x3001⤵
- Suspicious use of AdjustPrivilegeToken
PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5cd488961db34aaa8ef3178208699448e
SHA1a32ca7998015f97e09c1245bed2791e9c0ec81f9
SHA25659804d7599fb39235424f498e5fa4cd2434b2a924f37d60f842ea4a536e390ad
SHA51259ab7742cb29fa66c86b3ebe63605de647b4e1d874523eb95dac2d4c8db88c65afb906315fe43ebe69bbe2b9087cf4ffea977605aac7d2eb39fbf698ee0c005e
-
Filesize
64B
MD5446dd1cf97eaba21cf14d03aebc79f27
SHA136e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82