Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 16:08
Static task
static1
Behavioral task
behavioral1
Sample
MM2EBYPASS.bat
Resource
win7-20240708-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
MM2EBYPASS.bat
Resource
win10v2004-20240709-en
6 signatures
150 seconds
General
-
Target
MM2EBYPASS.bat
-
Size
64B
-
MD5
06a303a8aeea2c6e594901b0cdccfb35
-
SHA1
efdda2f7c4c77fd16915e0ed4b8873a8011ac5ba
-
SHA256
4d73ff1e68b0dbf4d0aa169daa635eee9a4ac80637440465ab1f9cd2ba670e8e
-
SHA512
b5a9865c47518e8e924b9aa3e55a9e10137fe42ed128f2c61c7cdb392a4719413ea66d3a85d1375f8b15f2764b858ee3ab2cf7eed92511eb0b392fe5c94cf7ff
Score
9/10
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\server\classes.jsa cmd.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\server\classes.jsa cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Globalization\ICU\icudtl.dat cmd.exe