General
-
Target
s32del.bat
-
Size
3KB
-
Sample
240818-zjx55swfpm
-
MD5
1ebabf927d8616982c979628ac5f64ea
-
SHA1
838adaaea597327c2dbbdd35fcbce782d7465bc8
-
SHA256
3817241b23609388852915df16050a19f143d8b40544aadd39d140c6ac7b106a
-
SHA512
4f6ceaf776aebf6f747c13088231c2618eee93495dc05ed58222028335fee9364dd529180c4490b56eb29f871867f42b0383c74eafa538e385d0981d006f425c
Static task
static1
Behavioral task
behavioral1
Sample
s32del.bat
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://th.bing.com/th/id/R.62d23dfdb2dd344b2cf500bb5c5ee296?rik=v7BDbMdGfMBhzg&pid=ImgRaw&r=0
Targets
-
-
Target
s32del.bat
-
Size
3KB
-
MD5
1ebabf927d8616982c979628ac5f64ea
-
SHA1
838adaaea597327c2dbbdd35fcbce782d7465bc8
-
SHA256
3817241b23609388852915df16050a19f143d8b40544aadd39d140c6ac7b106a
-
SHA512
4f6ceaf776aebf6f747c13088231c2618eee93495dc05ed58222028335fee9364dd529180c4490b56eb29f871867f42b0383c74eafa538e385d0981d006f425c
-
Blocklisted process makes network request
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Possible privilege escalation attempt
-
Modifies file permissions
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1File and Directory Permissions Modification
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
5