Overview
overview
9Static
static
3release/da...er.bat
windows11-21h2-x64
9release/da...er.bat
windows11-21h2-x64
8release/da...er.sys
windows11-21h2-x64
1release/da...er.bat
windows11-21h2-x64
1release/da...er.bat
windows11-21h2-x64
1release/da...er.exe
windows11-21h2-x64
1release/run.bat
windows11-21h2-x64
1Analysis
-
max time kernel
300s -
max time network
202s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/08/2024, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
release/data/createuser.bat
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
release/data/deleteuser.bat
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
release/data/driver.sys
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
release/data/macchanger.bat
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
release/data/spoofer.bat
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
release/data/spoofer.exe
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
release/run.bat
Resource
win11-20240802-en
General
-
Target
release/data/createuser.bat
-
Size
71B
-
MD5
a3fca2181219e47e252ad1e6c5901c86
-
SHA1
1b3ff050d9a5a2bec457228dd69db4bae7d550f3
-
SHA256
68a516c4b18ba7b28af6f27d7f461aa02f4c897d16e2bf73fc39567922546a2d
-
SHA512
279e6cd0d29d9cd8ed285238905cc1e905477c7f23ac44109d250549c6705c848b6edb970d64a0138f64c1bbe0328e8c484134f036e6160fefb92d148d85011a
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
Runs net.exe
-
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4324 wrote to memory of 5064 4324 cmd.exe 82 PID 4324 wrote to memory of 5064 4324 cmd.exe 82 PID 5064 wrote to memory of 4660 5064 net.exe 83 PID 5064 wrote to memory of 4660 5064 net.exe 83 PID 4324 wrote to memory of 5104 4324 cmd.exe 84 PID 4324 wrote to memory of 5104 4324 cmd.exe 84 PID 5104 wrote to memory of 4248 5104 net.exe 85 PID 5104 wrote to memory of 4248 5104 net.exe 85 PID 4916 wrote to memory of 1936 4916 cmd.exe 98 PID 4916 wrote to memory of 1936 4916 cmd.exe 98 PID 4916 wrote to memory of 1420 4916 cmd.exe 99 PID 4916 wrote to memory of 1420 4916 cmd.exe 99 PID 4916 wrote to memory of 2988 4916 cmd.exe 100 PID 4916 wrote to memory of 2988 4916 cmd.exe 100 PID 4916 wrote to memory of 1836 4916 cmd.exe 101 PID 4916 wrote to memory of 1836 4916 cmd.exe 101 PID 4916 wrote to memory of 2996 4916 cmd.exe 102 PID 4916 wrote to memory of 2996 4916 cmd.exe 102 PID 4916 wrote to memory of 4048 4916 cmd.exe 103 PID 4916 wrote to memory of 4048 4916 cmd.exe 103 PID 4916 wrote to memory of 1844 4916 cmd.exe 104 PID 4916 wrote to memory of 1844 4916 cmd.exe 104 PID 1844 wrote to memory of 4712 1844 cmd.exe 105 PID 1844 wrote to memory of 4712 1844 cmd.exe 105 PID 4916 wrote to memory of 4672 4916 cmd.exe 106 PID 4916 wrote to memory of 4672 4916 cmd.exe 106 PID 4916 wrote to memory of 4424 4916 cmd.exe 107 PID 4916 wrote to memory of 4424 4916 cmd.exe 107 PID 4916 wrote to memory of 2452 4916 cmd.exe 108 PID 4916 wrote to memory of 2452 4916 cmd.exe 108
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\release\data\createuser.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\system32\net.exenet user "Exitlag" /add2⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 user "Exitlag" /add3⤵PID:4660
-
-
-
C:\Windows\system32\net.exenet localgroup "Administrators" "Exitlag" /add2⤵
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 localgroup "Administrators" "Exitlag" /add3⤵PID:4248
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1608
-
C:\Windows\System32\DataExchangeHost.exeC:\Windows\System32\DataExchangeHost.exe -Embedding1⤵PID:1156
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\release\run.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ver2⤵PID:1936
-
-
C:\Windows\System32\reg.exereg query "HKCU\Console" /v ForceV22⤵PID:1420
-
-
C:\Windows\System32\find.exefind /i "0x0"2⤵PID:2988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\Admin\Desktop\release\run.bat" "2⤵PID:1836
-
-
C:\Windows\System32\find.exefind /i "C:\Users\Admin\AppData\Local\Temp"2⤵PID:2996
-
-
C:\Windows\System32\reg.exereg query HKU\S-1-5-192⤵PID:4048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop2⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\System32\reg.exereg query "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders" /v Desktop3⤵PID:4712
-
-
-
C:\Windows\System32\mode.commode 76, 302⤵PID:4672
-
-
C:\Windows\System32\choice.exechoice /C:123456 /N2⤵PID:4424
-
-
C:\Users\Admin\Desktop\release\data\spoofer.exeC:\Users\Admin\Desktop\release\\data\spoofer.exe "C:\Users\Admin\Desktop\release\\data\driver.sys2⤵PID:2452
-