Analysis

  • max time kernel
    45s
  • max time network
    7s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    05/08/2024, 20:25

General

  • Target

    cleaner.bat

  • Size

    6KB

  • MD5

    7491a6ad3e6f3be578e6bf7d53be67be

  • SHA1

    49b58131196a6fa137a0f876df02cf7a2d392206

  • SHA256

    0ac974d2bc2f50f02685dd576f0e1e0a200dd877259057100be62f78bef9f335

  • SHA512

    299044beb11523c85029848f4b86470978c4a33105cdfc6c152120f1f2d8cb6952f8c35a6c14b04ccc4745860c7bea5aee446e89a8a4457501c0b22ee8b4a21d

  • SSDEEP

    96:u8SCKCF5iixhyCKCF5iixhl6yZFCKCF5iixhJPIwWCPycZLcZd5h1p1A151uDa7O:u8xAPCaP8Ye

Score
3/10

Malware Config

Signatures

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\cleaner.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Windows\system32\mode.com
      mode con: cols=85 lines=15
      2⤵
        PID:2888
      • C:\Windows\system32\mode.com
        mode con: cols=83 lines=35
        2⤵
          PID:3512
        • C:\Windows\system32\PING.EXE
          PING localhost -n 3
          2⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:2244
        • C:\Windows\system32\PING.EXE
          PING localhost -n 3
          2⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4460

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads