General
-
Target
penis.bat
-
Size
211B
-
Sample
240829-weg2kstcnd
-
MD5
2c7b4b9e981962a2865f0b402fcbf099
-
SHA1
2836b4f798cdc6a4919cd8f915bda2d71f8423e9
-
SHA256
87093db0124c0b77b6c8c538684a2471266297abef18ec612c2bd5dd2a4edbda
-
SHA512
7356ecdc1b667bbfe8637d05d116e3c9a41648aa53527a84f1e4db455ea8a79774bc3c3232cfbf095fff6b00d90cfd8aab6f23d0f00543d0aca9938ea77316cb
Static task
static1
Behavioral task
behavioral1
Sample
penis.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
penis.bat
Resource
win11-20240802-en
Malware Config
Targets
-
-
Target
penis.bat
-
Size
211B
-
MD5
2c7b4b9e981962a2865f0b402fcbf099
-
SHA1
2836b4f798cdc6a4919cd8f915bda2d71f8423e9
-
SHA256
87093db0124c0b77b6c8c538684a2471266297abef18ec612c2bd5dd2a4edbda
-
SHA512
7356ecdc1b667bbfe8637d05d116e3c9a41648aa53527a84f1e4db455ea8a79774bc3c3232cfbf095fff6b00d90cfd8aab6f23d0f00543d0aca9938ea77316cb
Score10/10-
Modifies WinLogon for persistence
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Event Triggered Execution: AppInit DLLs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Event Triggered Execution
1AppInit DLLs
1Scheduled Task/Job
1Scheduled Task
1