Analysis

  • max time kernel
    63s
  • max time network
    64s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-08-2024 05:55

General

  • Target

    goodbyedpi-0.2.3rc1-2/goodbyedpi-0.2.3rc1/0_russia_update_blacklist_file.cmd

  • Size

    130B

  • MD5

    a6af4b081a4cbcd448759306b2366eac

  • SHA1

    0d1d887413e074b0991b5be0ca296f18053502c0

  • SHA256

    d9d7c57c7dedb3a4e6566ddd7623758f53986a2c34e0cd3784b84f7f881a01c4

  • SHA512

    f406b865f4bbe08181f1c1f239f198bab03b5b681174323b78f0b3c1790a1e177473a89ee566dac906c08d044fb0eb9a48991cf773222d378f469bd4941af62f

Score
8/10

Malware Config

Signatures

  • Download via BitsAdmin 1 TTPs 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 36 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\goodbyedpi-0.2.3rc1-2\goodbyedpi-0.2.3rc1\0_russia_update_blacklist_file.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Windows\system32\bitsadmin.exe
      bitsadmin /transfer blacklist https://p.thenewone.lol/domains-export.txt "C:\Users\Admin\AppData\Local\Temp\goodbyedpi-0.2.3rc1-2\goodbyedpi-0.2.3rc1\russia-blacklist.txt"
      2⤵
      • Download via BitsAdmin
      PID:4776
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Checks SCSI registry key(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4980

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4980-0-0x00000174F34F0000-0x00000174F34F1000-memory.dmp

    Filesize

    4KB

  • memory/4980-2-0x00000174F34F0000-0x00000174F34F1000-memory.dmp

    Filesize

    4KB

  • memory/4980-1-0x00000174F34F0000-0x00000174F34F1000-memory.dmp

    Filesize

    4KB

  • memory/4980-6-0x00000174F34F0000-0x00000174F34F1000-memory.dmp

    Filesize

    4KB

  • memory/4980-12-0x00000174F34F0000-0x00000174F34F1000-memory.dmp

    Filesize

    4KB

  • memory/4980-11-0x00000174F34F0000-0x00000174F34F1000-memory.dmp

    Filesize

    4KB

  • memory/4980-10-0x00000174F34F0000-0x00000174F34F1000-memory.dmp

    Filesize

    4KB

  • memory/4980-9-0x00000174F34F0000-0x00000174F34F1000-memory.dmp

    Filesize

    4KB

  • memory/4980-8-0x00000174F34F0000-0x00000174F34F1000-memory.dmp

    Filesize

    4KB

  • memory/4980-7-0x00000174F34F0000-0x00000174F34F1000-memory.dmp

    Filesize

    4KB