Analysis

  • max time kernel
    133s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-06-2024 08:48

General

  • Target

    pluto/files/info.bat

  • Size

    1008B

  • MD5

    e85f0ba77dcf1c969645d2332c4acf91

  • SHA1

    2950ca197922f4ba113234c64d70a219895386e6

  • SHA256

    68196f1acf2cd2ee6015d79e6fc66a8ef2d878527fd7d9cef290c2a011b4c6ec

  • SHA512

    01ac8bc0aa4e7c4565ef18ce80ce8887d5c22a9e3c3cd88dbbf9f3335d1b0793aa5ff5b86ec781663c4c5bf63a509ac7ac331ec3cf079d4bbcfc353ab4d1b619

Score
1/10

Malware Config

Signatures

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\pluto\files\info.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4816
    • C:\Windows\system32\systeminfo.exe
      systeminfo
      2⤵
      • Gathers system information
      PID:2564
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c type C:\Users\Admin\AppData\Local\Temp\info.txt | find "Registered Owner"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\info.txt "
        3⤵
          PID:3960
        • C:\Windows\system32\find.exe
          find "Registered Owner"
          3⤵
            PID:1940
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c type C:\Users\Admin\AppData\Local\Temp\info.txt | find "OS Name"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3356
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\info.txt "
            3⤵
              PID:3412
            • C:\Windows\system32\find.exe
              find "OS Name"
              3⤵
                PID:4040
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c type C:\Users\Admin\AppData\Local\Temp\info.txt | find "System Manufacturer"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4952
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\info.txt "
                3⤵
                  PID:5072
                • C:\Windows\system32\find.exe
                  find "System Manufacturer"
                  3⤵
                    PID:3120
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c type C:\Users\Admin\AppData\Local\Temp\info.txt | find "Product ID"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4076
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" type C:\Users\Admin\AppData\Local\Temp\info.txt "
                    3⤵
                      PID:1508
                    • C:\Windows\system32\find.exe
                      find "Product ID"
                      3⤵
                        PID:432

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\info.txt

                    Filesize

                    2KB

                    MD5

                    6c1e6d1e1ed8552936324e6e4dc02607

                    SHA1

                    ddb39c10b7c5fd143828bdde5d1f554977b22531

                    SHA256

                    4ce0701fb20dac168eeb9fa5a0f9479f4e7b57150da81a643963454f6cf8e6ec

                    SHA512

                    62280677d257c4091d75554a5f17a9bcc16dab90c8c1f8533704a40b8b529f628878f605b87ee84442c1cff7655094dc218707923ca14a65f79cda17e9708ded