Overview
overview
9Static
static
3sus/Pluton...er.exe
windows11-21h2-x64
3sus/data/c...er.bat
windows11-21h2-x64
9sus/data/d...er.bat
windows11-21h2-x64
8sus/data/driver.sys
windows11-21h2-x64
1sus/data/kdmapper.exe
windows11-21h2-x64
1sus/data/m...er.bat
windows11-21h2-x64
3sus/data/spoofer.bat
windows11-21h2-x64
1sus/data/spoofer.exe
windows11-21h2-x64
1sus/run.bat
windows11-21h2-x64
1Analysis
-
max time kernel
91s -
max time network
202s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/08/2024, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
sus/PlutoniumSpoofer.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
sus/data/createuser.bat
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
sus/data/deleteuser.bat
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
sus/data/driver.sys
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
sus/data/kdmapper.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
sus/data/macchanger.bat
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
sus/data/spoofer.bat
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
sus/data/spoofer.exe
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
sus/run.bat
Resource
win11-20240802-en
General
-
Target
sus/run.bat
-
Size
9KB
-
MD5
6050e9c5b35aeb80528e17b416de8aff
-
SHA1
0f5b3fca2bb24432fe83f6907e066b2d96997810
-
SHA256
55fbf0640d3cdc7be69c886a67052bb740a746742637990f9f289fec817963db
-
SHA512
b35b3f3a82fa15e74093d157525e1fa0a3f2300adf1393016e38c62e3b35f46a94919839f29c6a6f01a1f55afe0e40627fcdc4fa9dcd4e434df86274d0c432bd
-
SSDEEP
96:cT8T9OB3dwnXnLcisH0EB+yddAAalXlH45WdLBkqCviv:cw2Wn3wibEw0ilXlSuVkDE
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4384 wrote to memory of 3660 4384 cmd.exe 79 PID 4384 wrote to memory of 3660 4384 cmd.exe 79 PID 4384 wrote to memory of 1176 4384 cmd.exe 80 PID 4384 wrote to memory of 1176 4384 cmd.exe 80 PID 4384 wrote to memory of 4784 4384 cmd.exe 81 PID 4384 wrote to memory of 4784 4384 cmd.exe 81 PID 4384 wrote to memory of 2248 4384 cmd.exe 82 PID 4384 wrote to memory of 2248 4384 cmd.exe 82 PID 4384 wrote to memory of 4596 4384 cmd.exe 83 PID 4384 wrote to memory of 4596 4384 cmd.exe 83
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\sus\run.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ver2⤵PID:3660
-
-
C:\Windows\System32\reg.exereg query "HKCU\Console" /v ForceV22⤵PID:1176
-
-
C:\Windows\System32\find.exefind /i "0x0"2⤵PID:4784
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo "C:\Users\Admin\AppData\Local\Temp\sus\run.bat" "2⤵PID:2248
-
-
C:\Windows\System32\find.exefind /i "C:\Users\Admin\AppData\Local\Temp"2⤵PID:4596
-