Analysis
-
max time kernel
94s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 14:58
Static task
static1
Behavioral task
behavioral1
Sample
windows pro etkinlestirme.cmd
Resource
win7-20240708-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
windows pro etkinlestirme.cmd
Resource
win10v2004-20240709-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
windows pro etkinlestirme.cmd
-
Size
90B
-
MD5
379a9df2f9bd0dde05468bc000a22697
-
SHA1
d6fb46e9ee7fc5b0bf9fb302dcfb8148246ffe40
-
SHA256
c0f9fb177aa4c529dc4e6f6ba109e0e6dcffec7ebfaee30c6591369409c46508
-
SHA512
c2ec8d7ddbf856150d1cad6bd84ca142907a182bc2f90bd8d43bc77a6ea8cd63bdec94f542ed17bb8dc77464ef0ef05624dee739da9128e6ac00cfd045e93bfe
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 436 wrote to memory of 3280 436 cmd.exe 84 PID 436 wrote to memory of 3280 436 cmd.exe 84 PID 436 wrote to memory of 1248 436 cmd.exe 90 PID 436 wrote to memory of 1248 436 cmd.exe 90 PID 436 wrote to memory of 1524 436 cmd.exe 91 PID 436 wrote to memory of 1524 436 cmd.exe 91
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\windows pro etkinlestirme.cmd"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\slmgr.vbs" /ipk W269N-WFGWX-YVC9B-4J6C9-T83GX2⤵PID:3280
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\slmgr.vbs" /skms kms.lotro.cc2⤵PID:1248
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\system32\slmgr.vbs" /ato2⤵PID:1524
-