Resubmissions

05/09/2024, 22:37

240905-2j5w4asgkd 8

05/09/2024, 22:36

240905-2jlhfssfrc 8

05/09/2024, 22:33

240905-2gxspssbmr 8

Analysis

  • max time kernel
    420s
  • max time network
    1144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/09/2024, 22:36

General

  • Target

    RUN AS ADMIN TO SPOOF.bat

  • Size

    1KB

  • MD5

    8a9849441d8d4558339e98021b7be04c

  • SHA1

    24ac30df4477d55d3f02910fe7df4bf5c912ca3d

  • SHA256

    0fdbbfa21b02232eb1dc2882bccdffd966d046aac95e6fa8a20ce7470173097f

  • SHA512

    b48cb72b4bb81a95bf29f8211d98e6aeb65f83b8a3a1a21b70c9392e83fcb27f6b5eb799934590f0d22a6f2fd6449faa9249c2a65ab179258d6aa594c01401ba

Malware Config

Signatures

  • Creates new service(s) 2 TTPs
  • Stops running service(s) 4 TTPs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\RUN AS ADMIN TO SPOOF.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1244
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic diskdrive get serialnumber
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4764
    • C:\Windows\system32\cacls.exe
      "C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"
      2⤵
        PID:4600
      • C:\Windows\system32\sc.exe
        sc delete Win32KSys
        2⤵
        • Launches sc.exe
        PID:4356
      • C:\Windows\system32\sc.exe
        sc create Win32KSys type=kernel error=ignore binpath="C:\Windows\System32\Drivers\Win32K.sys" start=auto
        2⤵
        • Launches sc.exe
        PID:2696
      • C:\Windows\system32\sc.exe
        sc start Win32KSys
        2⤵
        • Launches sc.exe
        PID:3820
      • C:\Windows\system32\taskkill.exe
        taskkill /im WmiPrvSE.exe /f /t
        2⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1808
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic diskdrive get serialnumber
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3284
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic baseboard get pluh
        2⤵
          PID:2112

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads