Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 03:08

General

  • Target

    RedTester.bat

  • Size

    3KB

  • MD5

    f5835b92fa31b67c184c57507ec68b4a

  • SHA1

    129470581bf21b50d23abe7859b72b7da651cc55

  • SHA256

    5b35ced2da4b092dd074e448f006f6d8de75e8a68d6ed7d906853eeff60a5ab3

  • SHA512

    094b4fa16ab18e35748d307e4915b4c27d8577f07c4d64f5cf65de494d956c5fb9d537e1ceeade60e11e99c56308e8cbb688c767ba1ab14a627c344faa1f450a

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Drops file in Windows directory 3 IoCs
  • Modifies data under HKEY_USERS 43 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\RedTester.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Windows\system32\reg.exe
      Reg.exe ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d "0" /f
      2⤵
      • UAC bypass
      PID:2772
    • C:\Windows\system32\reg.exe
      Reg.exe add "HKCU\CONSOLE" /v "VirtualTerminalLevel" /t REG_DWORD /d "1" /f
      2⤵
        PID:2804
      • C:\Windows\system32\reg.exe
        Reg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "RPSessionInterval" /f
        2⤵
          PID:2744
        • C:\Windows\system32\reg.exe
          Reg.exe delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\SystemRestore" /v "DisableConfig" /f
          2⤵
            PID:2700
          • C:\Windows\system32\reg.exe
            Reg.exe add "HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore" /v "SystemRestorePointCreationFrequency" /t REG_DWORD /d 0 /f
            2⤵
              PID:2672
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -ExecutionPolicy Unrestricted -NoProfile Enable-ComputerRestore -Drive 'C:\'
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2680
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              powershell -ExecutionPolicy Bypass -Command "Checkpoint-Computer -Description 'Ratted Sauce' -RestorePointType 'MODIFY_SETTINGS'"
              2⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2488
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c "prompt #$H#$E# & echo on & for %b in (1) do rem"
              2⤵
                PID:536
            • C:\Windows\system32\vssvc.exe
              C:\Windows\system32\vssvc.exe
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1796
            • C:\Windows\system32\DrvInst.exe
              DrvInst.exe "1" "200" "STORAGE\VolumeSnapshot\HarddiskVolumeSnapshot19" "" "" "61530dda3" "0000000000000000" "00000000000005D8" "0000000000000328"
              1⤵
              • Drops file in Windows directory
              • Modifies data under HKEY_USERS
              • Suspicious use of AdjustPrivilegeToken
              PID:804

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

              Filesize

              7KB

              MD5

              979ffd37544b753124ec673914e84e14

              SHA1

              3754bbbfaabc6577b35f08c05925edf59db5b67e

              SHA256

              5b0ed3da5246db453205163511acb39e68e42feae7d4e75c248f3d897c31bf79

              SHA512

              19388d51ccd10dc5badf63d3aaea04b69e538c0bebf08cb80108c6e36b0a9b0ca8ff2722288bf403394313441247d1c877f9992e0e8ac3f69665947bde3c9ce2

            • memory/2488-16-0x000000001B640000-0x000000001B922000-memory.dmp

              Filesize

              2.9MB

            • memory/2488-17-0x00000000022C0000-0x00000000022C8000-memory.dmp

              Filesize

              32KB

            • memory/2680-4-0x000007FEF5D1E000-0x000007FEF5D1F000-memory.dmp

              Filesize

              4KB

            • memory/2680-5-0x000000001B720000-0x000000001BA02000-memory.dmp

              Filesize

              2.9MB

            • memory/2680-6-0x0000000002780000-0x0000000002788000-memory.dmp

              Filesize

              32KB

            • memory/2680-7-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

              Filesize

              9.6MB

            • memory/2680-8-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

              Filesize

              9.6MB

            • memory/2680-9-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

              Filesize

              9.6MB

            • memory/2680-10-0x000007FEF5A60000-0x000007FEF63FD000-memory.dmp

              Filesize

              9.6MB