Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 08:59
Static task
static1
Behavioral task
behavioral1
Sample
fixed_token_grabber (1).bat
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
fixed_token_grabber (1).bat
Resource
win10v2004-20240802-en
General
-
Target
fixed_token_grabber (1).bat
-
Size
19KB
-
MD5
49fae7a1882ffc5f399d87b67137a731
-
SHA1
7ba5ed655c599de4f05d9dc5c5ad367caa6f4ab3
-
SHA256
4c093503fc15521d72858350aa6da1bc271bb425d1640bf925c9caa641c695cf
-
SHA512
e3ced780a79d5c37b884be93cd5c8f782b19965352e6e4be28ac2441c2204df84cb6a7c948a0468727feff9a4069e97fdedc084105813a94078b7d6205582ff1
-
SSDEEP
384:DtbMSdVAg9120aNEkfYYGxQYUfPt7GusKrTt2OoXatpD:lCDfNEvYGxQYUfPt7GusKrTtHoXatpD
Malware Config
Extracted
https://discord.com/api/webhooks/1268965961969569992/5ZC3-hsLN4Ifht2uBYskLfX_tA_cn5Z-ngqCJRCykzz8S6Qbc-YU8f9E0EqJzqB8JpUE
Extracted
https://discord.com/api/webhooks/1268965961969569992/5ZC3-hsLN4Ifht2uBYskLfX_tA_cn5Z-ngqCJRCykzz8S6Qbc-YU8f9E0EqJzqB8JpUE
Signatures
-
pid Process 2760 powershell.exe 2264 powershell.exe 1600 powershell.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 2860 cmd.exe 2104 netsh.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2260 timeout.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2328 ipconfig.exe 580 NETSTAT.EXE -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 2124 systeminfo.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2760 powershell.exe 2264 powershell.exe 1600 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2760 powershell.exe Token: SeIncreaseQuotaPrivilege 2580 WMIC.exe Token: SeSecurityPrivilege 2580 WMIC.exe Token: SeTakeOwnershipPrivilege 2580 WMIC.exe Token: SeLoadDriverPrivilege 2580 WMIC.exe Token: SeSystemProfilePrivilege 2580 WMIC.exe Token: SeSystemtimePrivilege 2580 WMIC.exe Token: SeProfSingleProcessPrivilege 2580 WMIC.exe Token: SeIncBasePriorityPrivilege 2580 WMIC.exe Token: SeCreatePagefilePrivilege 2580 WMIC.exe Token: SeBackupPrivilege 2580 WMIC.exe Token: SeRestorePrivilege 2580 WMIC.exe Token: SeShutdownPrivilege 2580 WMIC.exe Token: SeDebugPrivilege 2580 WMIC.exe Token: SeSystemEnvironmentPrivilege 2580 WMIC.exe Token: SeRemoteShutdownPrivilege 2580 WMIC.exe Token: SeUndockPrivilege 2580 WMIC.exe Token: SeManageVolumePrivilege 2580 WMIC.exe Token: 33 2580 WMIC.exe Token: 34 2580 WMIC.exe Token: 35 2580 WMIC.exe Token: SeIncreaseQuotaPrivilege 2580 WMIC.exe Token: SeSecurityPrivilege 2580 WMIC.exe Token: SeTakeOwnershipPrivilege 2580 WMIC.exe Token: SeLoadDriverPrivilege 2580 WMIC.exe Token: SeSystemProfilePrivilege 2580 WMIC.exe Token: SeSystemtimePrivilege 2580 WMIC.exe Token: SeProfSingleProcessPrivilege 2580 WMIC.exe Token: SeIncBasePriorityPrivilege 2580 WMIC.exe Token: SeCreatePagefilePrivilege 2580 WMIC.exe Token: SeBackupPrivilege 2580 WMIC.exe Token: SeRestorePrivilege 2580 WMIC.exe Token: SeShutdownPrivilege 2580 WMIC.exe Token: SeDebugPrivilege 2580 WMIC.exe Token: SeSystemEnvironmentPrivilege 2580 WMIC.exe Token: SeRemoteShutdownPrivilege 2580 WMIC.exe Token: SeUndockPrivilege 2580 WMIC.exe Token: SeManageVolumePrivilege 2580 WMIC.exe Token: 33 2580 WMIC.exe Token: 34 2580 WMIC.exe Token: 35 2580 WMIC.exe Token: SeIncreaseQuotaPrivilege 2572 WMIC.exe Token: SeSecurityPrivilege 2572 WMIC.exe Token: SeTakeOwnershipPrivilege 2572 WMIC.exe Token: SeLoadDriverPrivilege 2572 WMIC.exe Token: SeSystemProfilePrivilege 2572 WMIC.exe Token: SeSystemtimePrivilege 2572 WMIC.exe Token: SeProfSingleProcessPrivilege 2572 WMIC.exe Token: SeIncBasePriorityPrivilege 2572 WMIC.exe Token: SeCreatePagefilePrivilege 2572 WMIC.exe Token: SeBackupPrivilege 2572 WMIC.exe Token: SeRestorePrivilege 2572 WMIC.exe Token: SeShutdownPrivilege 2572 WMIC.exe Token: SeDebugPrivilege 2572 WMIC.exe Token: SeSystemEnvironmentPrivilege 2572 WMIC.exe Token: SeRemoteShutdownPrivilege 2572 WMIC.exe Token: SeUndockPrivilege 2572 WMIC.exe Token: SeManageVolumePrivilege 2572 WMIC.exe Token: 33 2572 WMIC.exe Token: 34 2572 WMIC.exe Token: 35 2572 WMIC.exe Token: SeIncreaseQuotaPrivilege 2572 WMIC.exe Token: SeSecurityPrivilege 2572 WMIC.exe Token: SeTakeOwnershipPrivilege 2572 WMIC.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2264 powershell.exe 2264 powershell.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2660 2840 cmd.exe 31 PID 2840 wrote to memory of 2660 2840 cmd.exe 31 PID 2840 wrote to memory of 2660 2840 cmd.exe 31 PID 2660 wrote to memory of 2692 2660 net.exe 32 PID 2660 wrote to memory of 2692 2660 net.exe 32 PID 2660 wrote to memory of 2692 2660 net.exe 32 PID 2840 wrote to memory of 2760 2840 cmd.exe 33 PID 2840 wrote to memory of 2760 2840 cmd.exe 33 PID 2840 wrote to memory of 2760 2840 cmd.exe 33 PID 2840 wrote to memory of 2580 2840 cmd.exe 34 PID 2840 wrote to memory of 2580 2840 cmd.exe 34 PID 2840 wrote to memory of 2580 2840 cmd.exe 34 PID 2840 wrote to memory of 2572 2840 cmd.exe 36 PID 2840 wrote to memory of 2572 2840 cmd.exe 36 PID 2840 wrote to memory of 2572 2840 cmd.exe 36 PID 2840 wrote to memory of 2600 2840 cmd.exe 37 PID 2840 wrote to memory of 2600 2840 cmd.exe 37 PID 2840 wrote to memory of 2600 2840 cmd.exe 37 PID 2840 wrote to memory of 2124 2840 cmd.exe 38 PID 2840 wrote to memory of 2124 2840 cmd.exe 38 PID 2840 wrote to memory of 2124 2840 cmd.exe 38 PID 2840 wrote to memory of 3004 2840 cmd.exe 40 PID 2840 wrote to memory of 3004 2840 cmd.exe 40 PID 2840 wrote to memory of 3004 2840 cmd.exe 40 PID 2840 wrote to memory of 2860 2840 cmd.exe 41 PID 2840 wrote to memory of 2860 2840 cmd.exe 41 PID 2840 wrote to memory of 2860 2840 cmd.exe 41 PID 2860 wrote to memory of 2104 2860 cmd.exe 42 PID 2860 wrote to memory of 2104 2860 cmd.exe 42 PID 2860 wrote to memory of 2104 2860 cmd.exe 42 PID 2840 wrote to memory of 2328 2840 cmd.exe 43 PID 2840 wrote to memory of 2328 2840 cmd.exe 43 PID 2840 wrote to memory of 2328 2840 cmd.exe 43 PID 2840 wrote to memory of 580 2840 cmd.exe 44 PID 2840 wrote to memory of 580 2840 cmd.exe 44 PID 2840 wrote to memory of 580 2840 cmd.exe 44 PID 2840 wrote to memory of 2260 2840 cmd.exe 45 PID 2840 wrote to memory of 2260 2840 cmd.exe 45 PID 2840 wrote to memory of 2260 2840 cmd.exe 45 PID 2840 wrote to memory of 2264 2840 cmd.exe 46 PID 2840 wrote to memory of 2264 2840 cmd.exe 46 PID 2840 wrote to memory of 2264 2840 cmd.exe 46 PID 2840 wrote to memory of 1600 2840 cmd.exe 47 PID 2840 wrote to memory of 1600 2840 cmd.exe 47 PID 2840 wrote to memory of 1600 2840 cmd.exe 47
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\fixed_token_grabber (1).bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\net.exenet session2⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 session3⤵PID:2692
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Get-ItemProperty HKLM:\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\* | Select-Object DisplayName, DisplayVersion, Publisher, InstallDate | Format-Table >C:\Users\Admin\AppData\Local\Temp\programms.txt "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\System32\Wbem\WMIC.exewmic diskdrive get size2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\System32\Wbem\WMIC.exewmic bios get serialnumber2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\System32\Wbem\WMIC.exewmic cpu get name2⤵PID:2600
-
-
C:\Windows\system32\systeminfo.exesysteminfo2⤵
- Gathers system information
PID:2124
-
-
C:\Windows\System32\Wbem\WMIC.exewmic csproduct get uuid2⤵PID:3004
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c netsh wlan show profile2⤵
- System Network Configuration Discovery: Wi-Fi Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\system32\netsh.exenetsh wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Network Configuration Discovery: Wi-Fi Discovery
PID:2104
-
-
-
C:\Windows\system32\ipconfig.exeipconfig /all2⤵
- Gathers network information
PID:2328
-
-
C:\Windows\system32\NETSTAT.EXEnetstat -an2⤵
- Gathers network information
PID:580
-
-
C:\Windows\system32\timeout.exetimeout 12⤵
- Delays execution with timeout.exe
PID:2260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -executionpolicy remotesigned -File C:\Users\Admin\AppData\Local\Temp\test.ps12⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2264
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell.exe -executionpolicy remotesigned -File C:\Users\Admin\AppData\Local\Temp\testtttt.ps12⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD584e5cde8d6f8da30da6f23b4f86341d7
SHA1b8ee28471e77b36dc61ea2dc649ac1352738740f
SHA256c29e4d6c389bafada7d258c70be0bd89a3fe94a4210f50d0f2f77d9d38c113bc
SHA512261d164d8ddf3fe2256ad11ff83c0dbf4ecf231872a93b7daa5f2b7f2feb578bb1faffcac9fe553372aff0f6e0b85b260c0ca634586c2be53d73098014c194f1
-
Filesize
2KB
MD5cf0d2c2095fd8dfa4580ca51d954ea4c
SHA1f58b98b09b530e870a669597ac5d42bbe414b753
SHA256eaf3e00e8b3c23a16122893110bb3af795fa89d0f3911604aa48b785c5ba6810
SHA5126255f9f9089c014db3707e40320876b3a012608eb6f6d55a5e72ad7cd4f89104309d3e2644d8fd631f8a6313d2ffda8251b6845ba84301d178d5328fcc771eda
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5ed06a80c63115d691015b07084db7e33
SHA14b6078f717eb678bc51a7e2f8b097dcce9ce330e
SHA256fc0fd623b2be27af4c18a443effb3279c4fe7db10c34b70477435506a1d93f32
SHA51242dbd44018d67d47d1e53e892790cf0dc7c905efbd53875a26ca5d45b98a1ab37051c20498f11f55dfd67076da16aabd3089c5d3b83f5f326e01a09bc3ad5cfa