Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 16:50
Static task
static1
Behavioral task
behavioral1
Sample
trustedinstaller.bat
Resource
win7-20240708-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
trustedinstaller.bat
Resource
win10v2004-20240709-en
2 signatures
150 seconds
General
-
Target
trustedinstaller.bat
-
Size
1KB
-
MD5
1b66c83dc9ab21380f495be5f7cc8426
-
SHA1
7f53bd6c0f99a8b7b14148d95f8bfd21653dc452
-
SHA256
4bbe87743c410d144d3b226cb1629996d81e5660a9a6b0a590a5d3f082e72d14
-
SHA512
82407c26ab103653a2d0262db5925d8554e96409bbf8c56a469b6f646898350866dae4b32442d7c2f6bfa2ff2e87a3633e90d23f8349041161fc245c8f8fcf59
Score
7/10
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 1 IoCs
pid Process 2368 icacls.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1636 2036 cmd.exe 31 PID 2036 wrote to memory of 1636 2036 cmd.exe 31 PID 2036 wrote to memory of 1636 2036 cmd.exe 31 PID 2036 wrote to memory of 2368 2036 cmd.exe 32 PID 2036 wrote to memory of 2368 2036 cmd.exe 32 PID 2036 wrote to memory of 2368 2036 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\trustedinstaller.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\system32\openfiles.exeopenfiles2⤵PID:1636
-
-
C:\Windows\system32\icacls.exeicacls "" /grant:r TRUSTEDINSTALLER:(F) /T2⤵
- Modifies file permissions
PID:2368
-