Analysis

  • max time kernel
    13s
  • max time network
    14s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 15:15

Errors

Reason
Machine shutdown

General

  • Target

    ioo.bat

  • Size

    544B

  • MD5

    6a1d9e96c65fc9f1514b1dd47b627a58

  • SHA1

    a3f2cd825dd64bd870ab7537be79498a902f821c

  • SHA256

    516dd8ee7dfdb7d0f9ae3536b54e438639031ba330dbaeb498694448e3d8da4e

  • SHA512

    83ddd6c0c02b2f1bdab60d3a76eef6d31a8f165939a93b09685c71553065ccef33f2096d58095fa5712ce75e791c333ed16e553d7675cc83282724d4c34bd3c3

Score
1/10

Malware Config

Signatures

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ioo.bat"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Windows\system32\calc.exe
      calc
      2⤵
      • Modifies registry class
      PID:4896
    • C:\Windows\system32\msg.exe
      msg * R.I.P
      2⤵
        PID:4360
      • C:\Windows\system32\msg.exe
        msg * R.I.P
        2⤵
          PID:2528
        • C:\Windows\system32\shutdown.exe
          shutdown -r -t 10 -c "your computer is hacked bitch"
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4724
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /K start
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1376
          • C:\Windows\system32\cmd.exe
            cmd.exe
            3⤵
              PID:2296
        • C:\Windows\system32\OpenWith.exe
          C:\Windows\system32\OpenWith.exe -Embedding
          1⤵
          • Suspicious use of SetWindowsHookEx
          PID:3960
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x4 /state0:0xa3981855 /state1:0x41c64e6d
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:2884

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads