Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 09:52

General

  • Target

    SDFKKJHL.bat

  • Size

    1KB

  • MD5

    bc0b084b290472b958ffa4fc70851afb

  • SHA1

    dcd64f0d78f345dae44d5af80e2e40baf463f0f9

  • SHA256

    ec68eb0c7b556fb2d01b15e263c4583800b699642d1220f870dc9d4f9858347e

  • SHA512

    ef4d78aed65139ebb158048e59f66999c14b3ff661352b7d0e3e74f9b9d0521b66c7c4ae1f7886c97bdc3d68052c72dbb3e94e4d9beabc6144947efc054c1a99

Score
1/10

Malware Config

Signatures

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\SDFKKJHL.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2056
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic cpu get name, ProcessorId
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2876
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic baseboard get Product, Manufacturer, SerialNumber
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:860
    • C:\Windows\System32\Wbem\WMIC.exe
      wmic diskdrive get Model, SerialNumber
      2⤵
        PID:2752
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic bios get Manufacturer, SerialNumber, Version
        2⤵
          PID:2816
        • C:\Windows\system32\systeminfo.exe
          systeminfo
          2⤵
          • Gathers system information
          PID:3040
        • C:\Windows\system32\findstr.exe
          findstr /B /C:"OS Name" /C:"OS Version"
          2⤵
            PID:2848
          • C:\Windows\system32\ipconfig.exe
            ipconfig /all
            2⤵
            • Gathers network information
            PID:2640
        • C:\Windows\explorer.exe
          "C:\Windows\explorer.exe"
          1⤵
            PID:2020
          • C:\Windows\system32\AUDIODG.EXE
            C:\Windows\system32\AUDIODG.EXE 0x4f8
            1⤵
              PID:1736

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads