Analysis

  • max time kernel
    139s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/08/2024, 06:47

General

  • Target

    Launcher.bat

  • Size

    605B

  • MD5

    46d6baf18639fb319462dfd35d6fa3c8

  • SHA1

    bc5a75924578d6b4a42760e435cd6ca6bce1462c

  • SHA256

    ea08be982b18ecbe6a5af7525f5c49e478cf41067174e41058cf3db2f9581d37

  • SHA512

    9a68f4981efff0ffc4a9c47cdf4cd8ce4f9039ed903cb11a6935f4783adb27b3b56ccaeaad3d520ce26d9c96f5e6bfbcc53681cb9bb247f82183884bcc826f44

Score
6/10

Malware Config

Signatures

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Launcher.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4504
    • C:\Users\Admin\AppData\Local\Temp\compiler.exe
      compiler.exe conf.txt
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4744
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /sc daily /st 11:11 /f /tn GameOptimizerTask_ODA0 /tr ""C:\Users\Admin\AppData\Local\OWYsN2YsN2YsYTAsOWUsODYsOGMsOTYsNjQsN2Ms\ODA0.exe" "C:\Users\Admin\AppData\Local\OWYsN2YsN2YsYTAsOWUsODYsOGMsOTYsNjQsN2Ms\conf.txt""
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:3208
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /sc daily /st 11:11 /f /tn Setup /tr "C:/Windows/System32/oobe/Setup.exe" /rl highest
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:4592
      • C:\Users\Admin\AppData\Local\Temp\compiler.exe
        "C:\Users\Admin\AppData\Local\Temp\compiler.exe" "C:\Users\Admin\AppData\Roaming\tmp\conf.lua"
        3⤵
          PID:2688

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\tmp\conf.lua

      Filesize

      298KB

      MD5

      a6e82e3f005f61929f62c981670138b1

      SHA1

      71f15a319a5f8f353068b6463d153e7bcc4ebf23

      SHA256

      289b7cd5419091154d2db0c1c70e7580ccde22ebe59b03ada35e95ee6b530bd7

      SHA512

      0691bc3995e0bae2048c966a7f3c207cfd708fa691b2f95b85618c136ab3bb65d4201b4d9d690b3a3b7812c52c537175a91af6efcf98959ed5fca84aa7467cce

    • memory/2688-276-0x0000000001700000-0x0000000001701000-memory.dmp

      Filesize

      4KB

    • memory/4744-5-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-10-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-63-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-61-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-76-0x0000000001400000-0x0000000001401000-memory.dmp

      Filesize

      4KB

    • memory/4744-75-0x0000000001400000-0x0000000001401000-memory.dmp

      Filesize

      4KB

    • memory/4744-60-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-59-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-58-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-57-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-55-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-54-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-53-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-52-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-88-0x00000000018B0000-0x00000000018B1000-memory.dmp

      Filesize

      4KB

    • memory/4744-87-0x0000000001400000-0x0000000001401000-memory.dmp

      Filesize

      4KB

    • memory/4744-51-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-50-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-49-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-48-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-47-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-46-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-45-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-44-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-43-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-42-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-41-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-40-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-39-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-38-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-37-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-35-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-34-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-33-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-32-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-31-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-30-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-29-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-28-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-27-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-26-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-25-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-24-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-23-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-22-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-21-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-20-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-19-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-18-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-17-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-16-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-15-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-14-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-13-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-12-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-11-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-9-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-8-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-7-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-6-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-62-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-56-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-36-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-4-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-3-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-2-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-1-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB

    • memory/4744-0-0x000000007F960000-0x000000007F970000-memory.dmp

      Filesize

      64KB