Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 00:42

General

  • Target

    ILCCMAIN.bat

  • Size

    3KB

  • MD5

    c4731026d4014a801178df7a7f62da5b

  • SHA1

    9d68680bd7a44b8dbf87f77d387a325e8bb87c88

  • SHA256

    77c8b329c555605ecf56b0b0d31239dca4acb1ec3f610b5bdd530e0bcb43b496

  • SHA512

    c72cf0246db958f3727ab423531e57cfae6ac83c66e835c49af5b5b0dbd42db9608e628fb27fd2b4dbf9705ca99195ca020d0d353f1f4f6186264ee3e7d9d3f7

Score
1/10

Malware Config

Signatures

  • Modifies registry class 31 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ILCCMAIN.bat"
    1⤵
      PID:3116
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1160
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\New Text Document.txt
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        PID:1908
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\New Text Document.bat" "
        1⤵
          PID:4132
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\New Text Document.bat" "
          1⤵
            PID:3696

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\Desktop\New Text Document.bat

            Filesize

            20B

            MD5

            170c478416ce9786f5dda5df16e9dee2

            SHA1

            9cb79fcff7f3b21b812543d9841396b3a6e09e05

            SHA256

            3b85e2b41658b041dfe99baebdd8fa6bf82547c980c143a579aaa337ff3ab10a

            SHA512

            6dfb0fa95e1e67469f364ad8b871e055791ca72d4953ae24cf334cc3081edb2ccbf1ea1ff2ead13b90de464762fc8fdc8dcda4ebdad2434829226094402ecd75