Analysis
-
max time kernel
91s -
max time network
203s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/09/2024, 11:22
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
Launcher.bat
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
compiler.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral4
Sample
compiler.exe
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
lua51.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral6
Sample
lua51.dll
Resource
win11-20240802-en
General
-
Target
Launcher.bat
-
Size
1KB
-
MD5
657a0896af0d783b71acee3e3ac09ab3
-
SHA1
00346d1e96589652460cbcae7897cce245caa852
-
SHA256
c6e3c6dd72ee9a69ea53f0eea8285168bab3b534462a43bf41c0e6f4913512d4
-
SHA512
65f691628c1e0a22cdb30c49f7c641d5915e9236fb43ebe670c9bba4be296c8bd7c0b1a6b5a5537357cf9effb92533ff87e44bc8003a186bfb4a166a63a13263
Malware Config
Signatures
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 ip-api.com -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Setup\Scripts\ErrorHandler.cmd compiler.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language compiler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2036 schtasks.exe 1488 schtasks.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1920 1700 cmd.exe 79 PID 1700 wrote to memory of 1920 1700 cmd.exe 79 PID 1700 wrote to memory of 1920 1700 cmd.exe 79 PID 1920 wrote to memory of 2036 1920 compiler.exe 80 PID 1920 wrote to memory of 2036 1920 compiler.exe 80 PID 1920 wrote to memory of 2036 1920 compiler.exe 80 PID 1920 wrote to memory of 1488 1920 compiler.exe 81 PID 1920 wrote to memory of 1488 1920 compiler.exe 81 PID 1920 wrote to memory of 1488 1920 compiler.exe 81
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Launcher.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\compiler.execompiler.exe conf.txt2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc daily /st 13:08 /f /tn WordProcessorTask_ODA1 /tr ""C:\Users\Admin\AppData\Local\OWYsN2YsN2YsYTAsOWUsODYsOGMsOTYsNjQsN2Ms\ODA1.exe" "C:\Users\Admin\AppData\Local\OWYsN2YsN2YsYTAsOWUsODYsOGMsOTYsNjQsN2Ms\conf.txt""3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2036
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc daily /st 13:08 /f /tn Setup /tr "C:/Windows/System32/oobe/Setup.exe" /rl highest3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1488
-
-