Analysis

  • max time kernel
    3597s
  • max time network
    3507s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 16:06

General

  • Target

    testsh-main/solo_mine_example.cmd

  • Size

    821B

  • MD5

    090703e56f46330ed625ac4363c9d25c

  • SHA1

    6ce0b265e0860f1913f4bb37a17aa7eda88641c5

  • SHA256

    33497c69c21fa96bbc96f1d7f09608e462f8ab22555364977c0bd35fef27bc29

  • SHA512

    1cd8c43287508c9393300d5a22c565d2f4bd98493a203112fd727518a4e439eb74035d18fe1f52e2d3594305a841ca93fcd0e3c61634f0992cfd3fc253872f19

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\testsh-main\solo_mine_example.cmd"
    1⤵
      PID:1944
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious use of AdjustPrivilegeToken
      PID:212

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads