Analysis
-
max time kernel
104s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 07:37
Static task
static1
Behavioral task
behavioral1
Sample
iloveu.bat
Resource
win7-20240903-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
iloveu.bat
Resource
win10v2004-20240802-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
iloveu.bat
-
Size
407B
-
MD5
a9939aeb66d847e99abd1e90fa338fb5
-
SHA1
f96a93e367aad3cbc0ce6477c8dcef3a8bf6b33d
-
SHA256
f9f37002a708c8f1c1fd97fa4c60f983eeaa64c455b0674a361a88864fd13637
-
SHA512
6c06bc121f73af3dafa708da63fb1a6d59b32df472a5b42ccf999d07790083f3e7765c1b00d9966f318cd52cf2d3074fdcff98353102bded2593e68c4de5c310
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3712 timeout.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000_Classes\Local Settings OpenWith.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2352 NOTEPAD.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2872 OpenWith.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1376 wrote to memory of 3712 1376 cmd.exe 90 PID 1376 wrote to memory of 3712 1376 cmd.exe 90
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\iloveu.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\system32\timeout.exetimeout 32⤵
- Delays execution with timeout.exe
PID:3712
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\BlockInstall.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}1⤵
- System Location Discovery: System Language Discovery
PID:3644
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\b6cc3985f8cc4a3fb26c61d27e4fc26d /t 2116 /p 36441⤵PID:2616
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\ConvertToJoin.txt1⤵
- Opens file in notepad (likely ransom note)
PID:2352
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2872