Analysis

  • max time kernel
    18s
  • max time network
    25s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-08-2024 17:02

General

  • Target

    NOScript V1.35 Optimization Program.bat

  • Size

    15KB

  • MD5

    f72501a2238ea286b58a884955715a79

  • SHA1

    ba9f337268e43c39a3905514cb2c63cacb4b2b93

  • SHA256

    2d2da6c9e5056f5297d34b136d36f0d41716431ac10b9b03914f3bc8d69dc60d

  • SHA512

    06fc4c62adc04502fd67f1eb93d538f394984a39b0e35c855e867ce3e5d817b4f5ffc591d57c1b1fa84b16160af082e35eb8f6782b98b11cd30e003d5d342ddf

  • SSDEEP

    384:F29388dPX4v4K39lSknNX9Fpa0/Lc/27YV:jI

Malware Config

Signatures

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 64 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Time Discovery 1 TTPs 1 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\NOScript V1.35 Optimization Program.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4760
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c wmic nic where "NetEnabled=true" get NetConnectionID,NetEnabled /format:csv | find /i "true"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4748
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic nic where "NetEnabled=true" get NetConnectionID,NetEnabled /format:csv
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4720
      • C:\Windows\system32\find.exe
        find /i "true"
        3⤵
          PID:2504
      • C:\Windows\system32\netsh.exe
        netsh interface ip set global taskoffload=enabled
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:1092
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global chimney=enabled
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:3876
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global rss=enabled
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:3820
      • C:\Windows\system32\netsh.exe
        netsh interface ipv4 set subinterface "Ethernet" mtu=1500 store=persistent
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:4980
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global autotuninglevel=disabled
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:4360
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global congestionprovider=ctcp
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:1212
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global ecncapability=disabled
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:4092
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global timestamps=disabled
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        • System Time Discovery
        PID:3080
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global dca=enabled
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:1472
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global netdma=enabled
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:3676
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global rsc=enabled
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:1188
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global fastopen=enabled
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:2000
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global initialRto=300ms
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:2096
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global minRto=300ms
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:3872
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global maxsynRetransmissions=2
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:3956
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global maxconnections=65535
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:4048
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global dynamicport start=1025 num=64511
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:3096
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global maxuserport=65534
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:696
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global sackopts=enabled
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:2040
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global synattackprotect=enabled
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:1504
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global initialCongestionControlLevel=1
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:4520
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global initialCongestionWindow=2
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:4268
      • C:\Windows\system32\netsh.exe
        netsh interface tcp set global nonlocalsource=disabled
        2⤵
        • Event Triggered Execution: Netsh Helper DLL
        PID:3748
      • C:\Windows\system32\reg.exe
        reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters" /v TcpAckFrequency /t REG_DWORD /d 1 /f
        2⤵
          PID:2200
        • C:\Windows\system32\reg.exe
          reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters" /v TCPNoDelay /t REG_DWORD /d 1 /f
          2⤵
            PID:2404
          • C:\Windows\system32\reg.exe
            reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSMQ\Parameters" /v TCPNoDelay /t REG_DWORD /d 1 /f
            2⤵
              PID:3300
            • C:\Windows\system32\reg.exe
              reg add "HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\Psched" /v NonBestEffortLimit /t REG_DWORD /d 0 /f
              2⤵
                PID:4768
              • C:\Windows\system32\netsh.exe
                netsh interface set interface "Ethernet" admin=disable
                2⤵
                • Event Triggered Execution: Netsh Helper DLL
                PID:2328
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman
              1⤵
                PID:880

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads