Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-07-2024 06:54

General

  • Target

    JIGUtility_V2.0.8.0_20230112/ASUSR_ParsingRecord/ASUSR_ParsingRecord/run.bat

  • Size

    445B

  • MD5

    e9b66659059fb09bd910851557f01a4b

  • SHA1

    91799b761661882dccf6e10bfb1b15078cd41467

  • SHA256

    71d3617055ea34bfda2c87dfb2d0bb5f916597fbe7b2a5d6c39a2cddbf64a891

  • SHA512

    f96393b70cc3987dcad41640cceabc4cac6f23b89d25f98cfa95dfdba427e1a5b5a3120fa3bc56c5c23a2a2ea88c338e8e581216bd839e8c3180818246bff66e

Score
1/10

Malware Config

Signatures

  • Delays execution with timeout.exe 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\JIGUtility_V2.0.8.0_20230112\ASUSR_ParsingRecord\ASUSR_ParsingRecord\run.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4440
    • C:\Users\Admin\AppData\Local\Temp\JIGUtility_V2.0.8.0_20230112\ASUSR_ParsingRecord\ASUSR_ParsingRecord\ASUS_WNECT.exe
      ASUS_WNECT.exe /eeprom d a0 -dump rom.bin
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1700
    • C:\Windows\system32\timeout.exe
      timeout /t 3
      2⤵
      • Delays execution with timeout.exe
      PID:2712
    • C:\Users\Admin\AppData\Local\Temp\JIGUtility_V2.0.8.0_20230112\ASUSR_ParsingRecord\ASUSR_ParsingRecord\ASUSR_ParsingRecord.exe
      ASUSR_ParsingRecord.exe
      2⤵
        PID:4932
      • C:\Windows\system32\timeout.exe
        timeout /t 2
        2⤵
        • Delays execution with timeout.exe
        PID:3948

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\JIGUtility_V2.0.8.0_20230112\ASUSR_ParsingRecord\ASUSR_ParsingRecord\20240716_065520_eepromdebug.upload

      Filesize

      928B

      MD5

      db7f5c231b3d3be9ebe5343aebaa86a0

      SHA1

      40ce50d121a9899386bc3ca133f81db17c3296ee

      SHA256

      626507b33ac19c4611dc33e55c653cfcff4efae1942bed7d4fcf8e9e7996e45a

      SHA512

      657e50d058f3701a92702aec8f96e50f5da4d77245e1314e482f58de6924938af41fde420b947aa627ab483f62ef5a14b58f203fdb6670267c2af6288a78414a

    • C:\Users\Admin\AppData\Local\Temp\JIGUtility_V2.0.8.0_20230112\ASUSR_ParsingRecord\ASUSR_ParsingRecord\ASUSR_ParsingRecord.log

      Filesize

      10KB

      MD5

      0927278e30453131ed32de6c255b22be

      SHA1

      a97751cca47797151941c1d030c73376518e0d05

      SHA256

      f279294109dc473d74fedfd6e43c42a1d47035cbaaf4a368b2fd92e45620de95

      SHA512

      8f6dc80838508042b07e0ba9ee9add811f7c72a9b30df6478b305c9ff030856ced3ce8bbdf431436416abb8462e7a3f744daf5966d90327724056e51cbd97a0d

    • C:\Users\Admin\AppData\Local\Temp\JIGUtility_V2.0.8.0_20230112\ASUSR_ParsingRecord\ASUSR_ParsingRecord\Log_NECT_1721112916_20240716_065516.txt

      Filesize

      662B

      MD5

      3720e7748dd90fa9d7f85687732d609b

      SHA1

      32826c6d3ed65e4da079dce2d1e1eb4ab4847224

      SHA256

      9ebbcea841ba3635fc4690101cedd080573463e68c1b512e0d3b0f9d92cd1f01

      SHA512

      0d140ffd23c876a93452f23d0576a788357ec48c3d7259aedd4eaf12135d66c9af8612bb4030be55ecbbf0fd53c584ffe5a2762d696bd0efab1643500ae3f250