Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 15:56

General

  • Target

    TPMBypass.bat

  • Size

    371B

  • MD5

    457f8dbf9f5a9760fe65f7367ae42717

  • SHA1

    44d0389a82d3c719d7cb5a02404a7bb701c6457a

  • SHA256

    8394ca0b6025fce54abd2f51ee6b22d2e8fe11ddc786d41d20a75543a19dc73e

  • SHA512

    f40a9ca9a66c6c3e672579db3c9fba90947e8a31d4b0e1d8980f7d609ecba527a9dc4dd393b1648ffba83e54cd3ddd2781124c8b6fcff547ade29a0b7d608f86

Score
3/10

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\TPMBypass.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Windows\system32\reg.exe
      reg delete "HKLM\SYSTEM\CurrentControlSet\Services\TPM\WMI\Endorsement" /f
      2⤵
        PID:2740
      • C:\Windows\system32\reg.exe
        reg delete "HKLM\SYSTEM\ControlSet001\Services\TPM\WMI\Endorsement" /f
        2⤵
          PID:2772
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command "Disable-TPMAutoProvisioning"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2736
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -Command "Clear-Tpm"
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2768

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

              Filesize

              7KB

              MD5

              cbfe642777ac27c96be36becd9271460

              SHA1

              8b9658cf39f09e003465d3189ed5990c855de538

              SHA256

              5ee0e31ab85420e1102670f89009d7f27fd96b3ddfe8d193787a431b39424a0f

              SHA512

              77f0950a41282725c0120ef7647fb1bfb0d65d84b526b308340746053f4ca3e3ca7065277d134c3e480205186a7cceb92da511d20d58881eb758d854f109fd45

            • memory/2736-4-0x000007FEF56DE000-0x000007FEF56DF000-memory.dmp

              Filesize

              4KB

            • memory/2736-5-0x000000001B7A0000-0x000000001BA82000-memory.dmp

              Filesize

              2.9MB

            • memory/2736-6-0x0000000002250000-0x0000000002258000-memory.dmp

              Filesize

              32KB

            • memory/2736-8-0x000007FEF5420000-0x000007FEF5DBD000-memory.dmp

              Filesize

              9.6MB

            • memory/2736-7-0x000007FEF5420000-0x000007FEF5DBD000-memory.dmp

              Filesize

              9.6MB

            • memory/2736-9-0x000007FEF5420000-0x000007FEF5DBD000-memory.dmp

              Filesize

              9.6MB

            • memory/2736-10-0x000007FEF5420000-0x000007FEF5DBD000-memory.dmp

              Filesize

              9.6MB

            • memory/2768-16-0x000000001B5E0000-0x000000001B8C2000-memory.dmp

              Filesize

              2.9MB

            • memory/2768-17-0x0000000001E00000-0x0000000001E08000-memory.dmp

              Filesize

              32KB