Overview
overview
3Static
static
3CD/!startF.cmd
windows7-x64
1CD/!startF.cmd
windows10-2004-x64
1CD/start.cmd
windows7-x64
1CD/start.cmd
windows10-2004-x64
1CD/startd.cmd
windows7-x64
1CD/startd.cmd
windows10-2004-x64
1links.htm
windows7-x64
3links.htm
windows10-2004-x64
3start.exe
windows7-x64
3start.exe
windows10-2004-x64
3startd.cmd
windows7-x64
3startd.cmd
windows10-2004-x64
3startf.exe
windows7-x64
3startf.exe
windows10-2004-x64
3Analysis
-
max time kernel
141s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
CD/!startF.cmd
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
CD/!startF.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
CD/start.cmd
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
CD/start.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
CD/startd.cmd
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
CD/startd.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
links.htm
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
links.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
start.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
start.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
startd.cmd
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
startd.cmd
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
startf.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
startf.exe
Resource
win10v2004-20240802-en
General
-
Target
startd.cmd
-
Size
18B
-
MD5
d7818237a8ec6ae360ec2c7acbb3a323
-
SHA1
a823ea767a5be07462b9caa88f57a2011956dc89
-
SHA256
cde9bbba5a19dcec164b4369efe4ee6540304925487ab1e18093b5983f90eb11
-
SHA512
c212aedaf683708429ed8d82af979f4e11d559a649bae215337e5ec5d15eb7d64eb6904827e5f99479957130470778244473feb56ea681cb9bca6467a29e63f8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language start.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4708 start.exe Token: SeRestorePrivilege 4708 start.exe Token: SeBackupPrivilege 4708 start.exe Token: SeSecurityPrivilege 4708 start.exe Token: SeTcbPrivilege 4708 start.exe Token: SeImpersonatePrivilege 4708 start.exe Token: SeAssignPrimaryTokenPrivilege 4708 start.exe Token: SeCreateTokenPrivilege 4708 start.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4708 start.exe 4708 start.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1408 wrote to memory of 4708 1408 cmd.exe 92 PID 1408 wrote to memory of 4708 1408 cmd.exe 92 PID 1408 wrote to memory of 4708 1408 cmd.exe 92
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\startd.cmd"1⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\start.exestart.exe /d2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3364,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:81⤵PID:3872